Dec 13 14:19:36.645818 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:19:36.645831 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:19:36.645838 kernel: Disabled fast string operations Dec 13 14:19:36.645842 kernel: BIOS-provided physical RAM map: Dec 13 14:19:36.645845 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Dec 13 14:19:36.645849 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Dec 13 14:19:36.645855 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Dec 13 14:19:36.645859 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Dec 13 14:19:36.645863 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Dec 13 14:19:36.645867 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Dec 13 14:19:36.645872 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Dec 13 14:19:36.645876 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Dec 13 14:19:36.645880 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Dec 13 14:19:36.645884 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 14:19:36.645890 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Dec 13 14:19:36.645895 kernel: NX (Execute Disable) protection: active Dec 13 14:19:36.645900 kernel: SMBIOS 2.7 present. Dec 13 14:19:36.645904 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Dec 13 14:19:36.645909 kernel: vmware: hypercall mode: 0x00 Dec 13 14:19:36.645913 kernel: Hypervisor detected: VMware Dec 13 14:19:36.645918 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Dec 13 14:19:36.645923 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Dec 13 14:19:36.645927 kernel: vmware: using clock offset of 2556490871 ns Dec 13 14:19:36.645932 kernel: tsc: Detected 3408.000 MHz processor Dec 13 14:19:36.645937 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:19:36.645942 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:19:36.645946 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Dec 13 14:19:36.645951 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:19:36.645955 kernel: total RAM covered: 3072M Dec 13 14:19:36.645961 kernel: Found optimal setting for mtrr clean up Dec 13 14:19:36.645966 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Dec 13 14:19:36.645970 kernel: Using GB pages for direct mapping Dec 13 14:19:36.645975 kernel: ACPI: Early table checksum verification disabled Dec 13 14:19:36.645979 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Dec 13 14:19:36.645984 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Dec 13 14:19:36.645989 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Dec 13 14:19:36.645993 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Dec 13 14:19:36.645998 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:19:36.646002 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:19:36.646008 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Dec 13 14:19:36.646014 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Dec 13 14:19:36.646019 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Dec 13 14:19:36.646024 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Dec 13 14:19:36.646029 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Dec 13 14:19:36.646034 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Dec 13 14:19:36.646039 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Dec 13 14:19:36.646044 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Dec 13 14:19:36.646049 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:19:36.646054 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:19:36.646059 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Dec 13 14:19:36.646063 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Dec 13 14:19:36.646068 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Dec 13 14:19:36.646073 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Dec 13 14:19:36.646079 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Dec 13 14:19:36.646084 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Dec 13 14:19:36.646088 kernel: system APIC only can use physical flat Dec 13 14:19:36.646093 kernel: Setting APIC routing to physical flat. Dec 13 14:19:36.646098 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:19:36.646103 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 14:19:36.646108 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 14:19:36.646112 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 14:19:36.646117 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 14:19:36.646123 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 14:19:36.646128 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 14:19:36.646132 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 14:19:36.646137 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Dec 13 14:19:36.646142 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Dec 13 14:19:36.646147 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Dec 13 14:19:36.646152 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Dec 13 14:19:36.646156 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Dec 13 14:19:36.646161 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Dec 13 14:19:36.646169 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Dec 13 14:19:36.646175 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Dec 13 14:19:36.646180 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Dec 13 14:19:36.646185 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Dec 13 14:19:36.646190 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Dec 13 14:19:36.646194 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Dec 13 14:19:36.646199 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Dec 13 14:19:36.646204 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Dec 13 14:19:36.646209 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Dec 13 14:19:36.646213 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Dec 13 14:19:36.646218 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Dec 13 14:19:36.646224 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Dec 13 14:19:36.646228 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Dec 13 14:19:36.646233 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Dec 13 14:19:36.646238 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Dec 13 14:19:36.646243 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Dec 13 14:19:36.646247 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Dec 13 14:19:36.646252 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Dec 13 14:19:36.646257 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Dec 13 14:19:36.646262 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Dec 13 14:19:36.646267 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Dec 13 14:19:36.646272 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Dec 13 14:19:36.646277 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Dec 13 14:19:36.646282 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Dec 13 14:19:36.646287 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Dec 13 14:19:36.646291 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Dec 13 14:19:36.646296 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Dec 13 14:19:36.646301 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Dec 13 14:19:36.646306 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Dec 13 14:19:36.646310 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Dec 13 14:19:36.646315 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Dec 13 14:19:36.646321 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Dec 13 14:19:36.646326 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Dec 13 14:19:36.646330 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Dec 13 14:19:36.646335 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Dec 13 14:19:36.646340 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Dec 13 14:19:36.646344 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Dec 13 14:19:36.646349 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Dec 13 14:19:36.646354 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Dec 13 14:19:36.646359 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Dec 13 14:19:36.646363 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Dec 13 14:19:36.646369 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Dec 13 14:19:36.646374 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Dec 13 14:19:36.646379 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Dec 13 14:19:36.646383 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Dec 13 14:19:36.646388 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Dec 13 14:19:36.646394 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Dec 13 14:19:36.646401 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Dec 13 14:19:36.646407 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Dec 13 14:19:36.646413 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Dec 13 14:19:36.646418 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Dec 13 14:19:36.646424 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Dec 13 14:19:36.646434 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Dec 13 14:19:36.646454 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Dec 13 14:19:36.646460 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Dec 13 14:19:36.646465 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Dec 13 14:19:36.646470 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Dec 13 14:19:36.646475 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Dec 13 14:19:36.646480 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Dec 13 14:19:36.646487 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Dec 13 14:19:36.646493 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Dec 13 14:19:36.646498 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Dec 13 14:19:36.646503 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Dec 13 14:19:36.646508 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Dec 13 14:19:36.646513 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Dec 13 14:19:36.646518 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Dec 13 14:19:36.646523 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Dec 13 14:19:36.646528 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Dec 13 14:19:36.646534 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Dec 13 14:19:36.646540 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Dec 13 14:19:36.646545 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Dec 13 14:19:36.646550 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Dec 13 14:19:36.646556 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Dec 13 14:19:36.646561 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Dec 13 14:19:36.646566 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Dec 13 14:19:36.646571 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Dec 13 14:19:36.646576 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Dec 13 14:19:36.646581 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Dec 13 14:19:36.646587 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Dec 13 14:19:36.646592 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Dec 13 14:19:36.646597 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Dec 13 14:19:36.646603 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Dec 13 14:19:36.646608 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Dec 13 14:19:36.646613 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Dec 13 14:19:36.646618 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Dec 13 14:19:36.646623 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Dec 13 14:19:36.646628 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Dec 13 14:19:36.646633 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Dec 13 14:19:36.646639 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Dec 13 14:19:36.646644 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Dec 13 14:19:36.646650 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Dec 13 14:19:36.646655 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Dec 13 14:19:36.646660 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Dec 13 14:19:36.646665 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Dec 13 14:19:36.646670 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Dec 13 14:19:36.646675 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Dec 13 14:19:36.646680 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Dec 13 14:19:36.646685 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Dec 13 14:19:36.646691 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Dec 13 14:19:36.646696 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Dec 13 14:19:36.646701 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Dec 13 14:19:36.646706 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Dec 13 14:19:36.646711 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Dec 13 14:19:36.646717 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Dec 13 14:19:36.646722 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Dec 13 14:19:36.646727 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Dec 13 14:19:36.646732 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Dec 13 14:19:36.646737 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Dec 13 14:19:36.646743 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Dec 13 14:19:36.646748 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Dec 13 14:19:36.646754 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Dec 13 14:19:36.646759 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Dec 13 14:19:36.646764 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Dec 13 14:19:36.646769 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Dec 13 14:19:36.646774 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:19:36.646779 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 14:19:36.646785 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Dec 13 14:19:36.646790 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Dec 13 14:19:36.646797 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Dec 13 14:19:36.646802 kernel: Zone ranges: Dec 13 14:19:36.646808 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:19:36.646813 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Dec 13 14:19:36.646818 kernel: Normal empty Dec 13 14:19:36.646823 kernel: Movable zone start for each node Dec 13 14:19:36.646829 kernel: Early memory node ranges Dec 13 14:19:36.646834 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Dec 13 14:19:36.646839 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Dec 13 14:19:36.646845 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Dec 13 14:19:36.646850 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Dec 13 14:19:36.646855 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:19:36.646861 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Dec 13 14:19:36.646866 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Dec 13 14:19:36.646871 kernel: ACPI: PM-Timer IO Port: 0x1008 Dec 13 14:19:36.646876 kernel: system APIC only can use physical flat Dec 13 14:19:36.646881 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Dec 13 14:19:36.646886 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 14:19:36.646893 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 14:19:36.646898 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 14:19:36.646903 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 14:19:36.646908 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 14:19:36.646913 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 14:19:36.646918 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 14:19:36.646924 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 14:19:36.646929 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 14:19:36.646934 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 14:19:36.646939 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 14:19:36.646945 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 14:19:36.646950 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 14:19:36.646956 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 14:19:36.646961 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 14:19:36.646966 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 14:19:36.646971 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Dec 13 14:19:36.646976 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Dec 13 14:19:36.646982 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Dec 13 14:19:36.646987 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Dec 13 14:19:36.646993 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Dec 13 14:19:36.646998 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Dec 13 14:19:36.647003 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Dec 13 14:19:36.647008 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Dec 13 14:19:36.647013 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Dec 13 14:19:36.647018 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Dec 13 14:19:36.647024 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Dec 13 14:19:36.647029 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Dec 13 14:19:36.647034 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Dec 13 14:19:36.647039 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Dec 13 14:19:36.647045 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Dec 13 14:19:36.647050 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Dec 13 14:19:36.647055 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Dec 13 14:19:36.647061 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Dec 13 14:19:36.647066 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Dec 13 14:19:36.647071 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Dec 13 14:19:36.647076 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Dec 13 14:19:36.647081 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Dec 13 14:19:36.647086 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Dec 13 14:19:36.647092 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Dec 13 14:19:36.647097 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Dec 13 14:19:36.647103 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Dec 13 14:19:36.647108 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Dec 13 14:19:36.647113 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Dec 13 14:19:36.647118 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Dec 13 14:19:36.647123 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Dec 13 14:19:36.647128 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Dec 13 14:19:36.647133 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Dec 13 14:19:36.647139 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Dec 13 14:19:36.647145 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Dec 13 14:19:36.647150 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Dec 13 14:19:36.647155 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Dec 13 14:19:36.647160 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Dec 13 14:19:36.647165 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Dec 13 14:19:36.647170 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Dec 13 14:19:36.647176 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Dec 13 14:19:36.647181 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Dec 13 14:19:36.647186 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Dec 13 14:19:36.647192 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Dec 13 14:19:36.647197 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Dec 13 14:19:36.647203 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Dec 13 14:19:36.647208 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Dec 13 14:19:36.647213 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Dec 13 14:19:36.647218 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Dec 13 14:19:36.647223 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Dec 13 14:19:36.647228 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Dec 13 14:19:36.647234 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Dec 13 14:19:36.647239 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Dec 13 14:19:36.647245 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Dec 13 14:19:36.647250 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Dec 13 14:19:36.647255 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Dec 13 14:19:36.647260 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Dec 13 14:19:36.647266 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Dec 13 14:19:36.647271 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Dec 13 14:19:36.647276 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Dec 13 14:19:36.647281 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Dec 13 14:19:36.647286 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Dec 13 14:19:36.647292 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Dec 13 14:19:36.647297 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Dec 13 14:19:36.647303 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Dec 13 14:19:36.647308 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Dec 13 14:19:36.647313 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Dec 13 14:19:36.647318 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Dec 13 14:19:36.647323 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Dec 13 14:19:36.647329 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Dec 13 14:19:36.647334 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Dec 13 14:19:36.647339 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Dec 13 14:19:36.647345 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Dec 13 14:19:36.647350 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Dec 13 14:19:36.647355 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Dec 13 14:19:36.647360 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Dec 13 14:19:36.647366 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Dec 13 14:19:36.647371 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Dec 13 14:19:36.647376 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Dec 13 14:19:36.647381 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Dec 13 14:19:36.647386 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Dec 13 14:19:36.647392 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Dec 13 14:19:36.647397 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Dec 13 14:19:36.647403 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Dec 13 14:19:36.647408 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Dec 13 14:19:36.647413 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Dec 13 14:19:36.647418 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Dec 13 14:19:36.647423 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Dec 13 14:19:36.647434 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Dec 13 14:19:36.647440 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Dec 13 14:19:36.647451 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Dec 13 14:19:36.647456 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Dec 13 14:19:36.647461 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Dec 13 14:19:36.647467 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Dec 13 14:19:36.647472 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Dec 13 14:19:36.647477 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Dec 13 14:19:36.647482 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Dec 13 14:19:36.647487 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Dec 13 14:19:36.647492 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Dec 13 14:19:36.647498 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Dec 13 14:19:36.647504 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Dec 13 14:19:36.647509 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Dec 13 14:19:36.647514 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Dec 13 14:19:36.647519 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Dec 13 14:19:36.647524 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Dec 13 14:19:36.647530 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Dec 13 14:19:36.647535 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Dec 13 14:19:36.647540 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Dec 13 14:19:36.647545 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Dec 13 14:19:36.647551 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Dec 13 14:19:36.647556 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Dec 13 14:19:36.647562 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Dec 13 14:19:36.647567 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:19:36.647572 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Dec 13 14:19:36.647577 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:19:36.647583 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Dec 13 14:19:36.647588 kernel: TSC deadline timer available Dec 13 14:19:36.647593 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Dec 13 14:19:36.647598 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Dec 13 14:19:36.647604 kernel: Booting paravirtualized kernel on VMware hypervisor Dec 13 14:19:36.647610 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:19:36.647615 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Dec 13 14:19:36.647620 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 14:19:36.647626 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 14:19:36.647631 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Dec 13 14:19:36.647636 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Dec 13 14:19:36.647641 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Dec 13 14:19:36.647647 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Dec 13 14:19:36.647652 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Dec 13 14:19:36.647657 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Dec 13 14:19:36.647662 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Dec 13 14:19:36.647674 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Dec 13 14:19:36.647681 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Dec 13 14:19:36.647686 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Dec 13 14:19:36.647692 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Dec 13 14:19:36.647697 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Dec 13 14:19:36.647703 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Dec 13 14:19:36.647709 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Dec 13 14:19:36.647714 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Dec 13 14:19:36.647719 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Dec 13 14:19:36.647725 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Dec 13 14:19:36.647730 kernel: Policy zone: DMA32 Dec 13 14:19:36.647737 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:19:36.647743 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:19:36.647749 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Dec 13 14:19:36.647755 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Dec 13 14:19:36.647760 kernel: printk: log_buf_len min size: 262144 bytes Dec 13 14:19:36.647766 kernel: printk: log_buf_len: 1048576 bytes Dec 13 14:19:36.647772 kernel: printk: early log buf free: 239728(91%) Dec 13 14:19:36.647777 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:19:36.647783 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:19:36.647789 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:19:36.647794 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 155976K reserved, 0K cma-reserved) Dec 13 14:19:36.647801 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Dec 13 14:19:36.647807 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:19:36.647813 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:19:36.647820 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:19:36.647826 kernel: rcu: RCU event tracing is enabled. Dec 13 14:19:36.647831 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Dec 13 14:19:36.647838 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:19:36.647844 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:19:36.647849 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:19:36.647855 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Dec 13 14:19:36.647861 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Dec 13 14:19:36.647866 kernel: random: crng init done Dec 13 14:19:36.647871 kernel: Console: colour VGA+ 80x25 Dec 13 14:19:36.647877 kernel: printk: console [tty0] enabled Dec 13 14:19:36.647883 kernel: printk: console [ttyS0] enabled Dec 13 14:19:36.647889 kernel: ACPI: Core revision 20210730 Dec 13 14:19:36.647895 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Dec 13 14:19:36.647900 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:19:36.647906 kernel: x2apic enabled Dec 13 14:19:36.647912 kernel: Switched APIC routing to physical x2apic. Dec 13 14:19:36.647917 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:19:36.647923 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:19:36.647928 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Dec 13 14:19:36.647934 kernel: Disabled fast string operations Dec 13 14:19:36.647940 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:19:36.647946 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:19:36.647952 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:19:36.647958 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 14:19:36.647963 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:19:36.647969 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:19:36.647975 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 14:19:36.647980 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:19:36.647986 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 14:19:36.647992 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 14:19:36.647998 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:19:36.648004 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:19:36.648009 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:19:36.648015 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 14:19:36.648021 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:19:36.648026 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:19:36.648032 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:19:36.648038 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:19:36.648044 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:19:36.648050 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 13 14:19:36.648056 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:19:36.648061 kernel: pid_max: default: 131072 minimum: 1024 Dec 13 14:19:36.648067 kernel: LSM: Security Framework initializing Dec 13 14:19:36.648073 kernel: SELinux: Initializing. Dec 13 14:19:36.648078 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:19:36.648084 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:19:36.648090 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 14:19:36.648096 kernel: Performance Events: Skylake events, core PMU driver. Dec 13 14:19:36.648102 kernel: core: CPUID marked event: 'cpu cycles' unavailable Dec 13 14:19:36.648108 kernel: core: CPUID marked event: 'instructions' unavailable Dec 13 14:19:36.648113 kernel: core: CPUID marked event: 'bus cycles' unavailable Dec 13 14:19:36.648118 kernel: core: CPUID marked event: 'cache references' unavailable Dec 13 14:19:36.648124 kernel: core: CPUID marked event: 'cache misses' unavailable Dec 13 14:19:36.648129 kernel: core: CPUID marked event: 'branch instructions' unavailable Dec 13 14:19:36.648135 kernel: core: CPUID marked event: 'branch misses' unavailable Dec 13 14:19:36.648141 kernel: ... version: 1 Dec 13 14:19:36.648147 kernel: ... bit width: 48 Dec 13 14:19:36.648152 kernel: ... generic registers: 4 Dec 13 14:19:36.648158 kernel: ... value mask: 0000ffffffffffff Dec 13 14:19:36.648168 kernel: ... max period: 000000007fffffff Dec 13 14:19:36.648174 kernel: ... fixed-purpose events: 0 Dec 13 14:19:36.648179 kernel: ... event mask: 000000000000000f Dec 13 14:19:36.648185 kernel: signal: max sigframe size: 1776 Dec 13 14:19:36.648191 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:19:36.648198 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:19:36.648204 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:19:36.648209 kernel: x86: Booting SMP configuration: Dec 13 14:19:36.648215 kernel: .... node #0, CPUs: #1 Dec 13 14:19:36.648220 kernel: Disabled fast string operations Dec 13 14:19:36.648226 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Dec 13 14:19:36.648232 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 14:19:36.648237 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:19:36.648243 kernel: smpboot: Max logical packages: 128 Dec 13 14:19:36.648248 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Dec 13 14:19:36.648255 kernel: devtmpfs: initialized Dec 13 14:19:36.648260 kernel: x86/mm: Memory block size: 128MB Dec 13 14:19:36.648266 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Dec 13 14:19:36.648271 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:19:36.648277 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Dec 13 14:19:36.648282 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:19:36.648288 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:19:36.648293 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:19:36.648299 kernel: audit: type=2000 audit(1734099575.061:1): state=initialized audit_enabled=0 res=1 Dec 13 14:19:36.648306 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:19:36.648311 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:19:36.648317 kernel: cpuidle: using governor menu Dec 13 14:19:36.648323 kernel: Simple Boot Flag at 0x36 set to 0x80 Dec 13 14:19:36.648328 kernel: ACPI: bus type PCI registered Dec 13 14:19:36.648334 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:19:36.648339 kernel: dca service started, version 1.12.1 Dec 13 14:19:36.648345 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Dec 13 14:19:36.648351 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Dec 13 14:19:36.648357 kernel: PCI: Using configuration type 1 for base access Dec 13 14:19:36.648363 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:19:36.648369 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:19:36.648374 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:19:36.648380 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:19:36.648385 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:19:36.648391 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:19:36.648396 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:19:36.648402 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:19:36.648408 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:19:36.648414 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:19:36.648420 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:19:36.648426 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Dec 13 14:19:36.648453 kernel: ACPI: Interpreter enabled Dec 13 14:19:36.648459 kernel: ACPI: PM: (supports S0 S1 S5) Dec 13 14:19:36.648465 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:19:36.648471 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:19:36.648477 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Dec 13 14:19:36.648484 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Dec 13 14:19:36.648555 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:19:36.648604 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Dec 13 14:19:36.648649 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Dec 13 14:19:36.648657 kernel: PCI host bridge to bus 0000:00 Dec 13 14:19:36.648704 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:19:36.648745 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Dec 13 14:19:36.648788 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Dec 13 14:19:36.648828 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Dec 13 14:19:36.648867 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Dec 13 14:19:36.648906 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:19:36.648946 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:19:36.648985 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Dec 13 14:19:36.649026 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Dec 13 14:19:36.649080 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Dec 13 14:19:36.649132 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Dec 13 14:19:36.649184 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Dec 13 14:19:36.649233 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Dec 13 14:19:36.649280 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Dec 13 14:19:36.649325 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 14:19:36.649373 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 14:19:36.649418 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 14:19:36.649476 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 14:19:36.649528 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Dec 13 14:19:36.649575 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Dec 13 14:19:36.649622 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Dec 13 14:19:36.649672 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Dec 13 14:19:36.649720 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Dec 13 14:19:36.649765 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Dec 13 14:19:36.649815 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Dec 13 14:19:36.649862 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Dec 13 14:19:36.649908 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Dec 13 14:19:36.649955 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Dec 13 14:19:36.650033 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Dec 13 14:19:36.650308 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:19:36.650370 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Dec 13 14:19:36.650440 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.660644 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.660708 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.660759 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.660826 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.660875 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.661503 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.661566 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.661626 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.661679 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.661738 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.661790 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.661845 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.661896 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.661951 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662003 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.662061 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662112 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.662170 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662222 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.662275 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662336 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.662391 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662452 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.662506 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662561 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.662616 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662667 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.662725 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662778 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.662831 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662882 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.662936 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.662987 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.663043 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.663093 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.663147 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.663215 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.663289 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.663341 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.663397 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.663476 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.663531 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.663581 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.663636 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.663687 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.663750 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.663802 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.663857 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.663908 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.663961 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.664011 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.664065 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.664118 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.664182 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.664236 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.664289 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.664340 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.664393 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.664459 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.664516 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.664568 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.664624 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:19:36.664676 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.664731 kernel: pci_bus 0000:01: extended config space not accessible Dec 13 14:19:36.664788 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:19:36.664843 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 14:19:36.664852 kernel: acpiphp: Slot [32] registered Dec 13 14:19:36.664858 kernel: acpiphp: Slot [33] registered Dec 13 14:19:36.664864 kernel: acpiphp: Slot [34] registered Dec 13 14:19:36.664870 kernel: acpiphp: Slot [35] registered Dec 13 14:19:36.664875 kernel: acpiphp: Slot [36] registered Dec 13 14:19:36.664881 kernel: acpiphp: Slot [37] registered Dec 13 14:19:36.664889 kernel: acpiphp: Slot [38] registered Dec 13 14:19:36.664894 kernel: acpiphp: Slot [39] registered Dec 13 14:19:36.664900 kernel: acpiphp: Slot [40] registered Dec 13 14:19:36.664906 kernel: acpiphp: Slot [41] registered Dec 13 14:19:36.664911 kernel: acpiphp: Slot [42] registered Dec 13 14:19:36.664917 kernel: acpiphp: Slot [43] registered Dec 13 14:19:36.664923 kernel: acpiphp: Slot [44] registered Dec 13 14:19:36.664929 kernel: acpiphp: Slot [45] registered Dec 13 14:19:36.664934 kernel: acpiphp: Slot [46] registered Dec 13 14:19:36.664940 kernel: acpiphp: Slot [47] registered Dec 13 14:19:36.664947 kernel: acpiphp: Slot [48] registered Dec 13 14:19:36.664953 kernel: acpiphp: Slot [49] registered Dec 13 14:19:36.664958 kernel: acpiphp: Slot [50] registered Dec 13 14:19:36.664964 kernel: acpiphp: Slot [51] registered Dec 13 14:19:36.664970 kernel: acpiphp: Slot [52] registered Dec 13 14:19:36.664976 kernel: acpiphp: Slot [53] registered Dec 13 14:19:36.664981 kernel: acpiphp: Slot [54] registered Dec 13 14:19:36.664987 kernel: acpiphp: Slot [55] registered Dec 13 14:19:36.664992 kernel: acpiphp: Slot [56] registered Dec 13 14:19:36.664999 kernel: acpiphp: Slot [57] registered Dec 13 14:19:36.665004 kernel: acpiphp: Slot [58] registered Dec 13 14:19:36.665010 kernel: acpiphp: Slot [59] registered Dec 13 14:19:36.665015 kernel: acpiphp: Slot [60] registered Dec 13 14:19:36.665021 kernel: acpiphp: Slot [61] registered Dec 13 14:19:36.665027 kernel: acpiphp: Slot [62] registered Dec 13 14:19:36.665032 kernel: acpiphp: Slot [63] registered Dec 13 14:19:36.665083 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Dec 13 14:19:36.665138 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:19:36.665191 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:19:36.665242 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:19:36.665292 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Dec 13 14:19:36.665342 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Dec 13 14:19:36.665392 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Dec 13 14:19:36.665452 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Dec 13 14:19:36.665505 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Dec 13 14:19:36.665556 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Dec 13 14:19:36.665610 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Dec 13 14:19:36.665660 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Dec 13 14:19:36.665717 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Dec 13 14:19:36.665771 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Dec 13 14:19:36.665823 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Dec 13 14:19:36.665876 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:19:36.665928 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 14:19:36.665983 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:19:36.666034 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:19:36.666085 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:19:36.666150 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:19:36.666217 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:19:36.666268 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:19:36.666319 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:19:36.666369 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:19:36.666423 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:19:36.666587 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:19:36.666639 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:19:36.666690 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:19:36.666741 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:19:36.666792 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:19:36.666842 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:19:36.666896 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:19:36.666947 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:19:36.666998 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:19:36.667050 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:19:36.667102 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:19:36.667152 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:19:36.667203 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:19:36.667253 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:19:36.667303 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:19:36.667354 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:19:36.667405 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:19:36.667505 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:19:36.667566 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Dec 13 14:19:36.667620 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Dec 13 14:19:36.667672 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Dec 13 14:19:36.667724 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Dec 13 14:19:36.667776 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Dec 13 14:19:36.667828 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:19:36.667880 kernel: pci 0000:0b:00.0: supports D1 D2 Dec 13 14:19:36.667932 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:19:36.667986 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:19:36.668037 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:19:36.668088 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:19:36.668137 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:19:36.668199 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:19:36.668250 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:19:36.668300 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:19:36.668349 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:19:36.668403 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:19:36.668883 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:19:36.668942 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:19:36.668996 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:19:36.669049 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:19:36.669101 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:19:36.669152 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:19:36.669206 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:19:36.669258 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:19:36.669308 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:19:36.669360 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:19:36.669411 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:19:36.671510 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:19:36.671566 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:19:36.671617 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:19:36.671677 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:19:36.671726 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:19:36.671773 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:19:36.671819 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:19:36.671866 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:19:36.671928 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:19:36.671977 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:19:36.672023 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:19:36.672074 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:19:36.672120 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:19:36.676495 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:19:36.676555 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:19:36.676611 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:19:36.676662 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:19:36.676713 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:19:36.676763 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:19:36.676818 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:19:36.676868 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:19:36.676918 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:19:36.676970 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:19:36.677019 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:19:36.677068 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:19:36.677119 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:19:36.677172 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:19:36.677221 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:19:36.677272 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:19:36.677321 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:19:36.677371 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:19:36.677423 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:19:36.677496 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:19:36.677545 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:19:36.677598 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:19:36.677648 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:19:36.677697 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:19:36.677747 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:19:36.677798 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:19:36.677847 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:19:36.677897 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:19:36.677945 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:19:36.677998 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:19:36.678048 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:19:36.678096 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:19:36.678147 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:19:36.678208 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:19:36.678259 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:19:36.678310 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:19:36.678360 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:19:36.678411 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:19:36.678474 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:19:36.678527 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:19:36.678577 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:19:36.678627 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:19:36.678676 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:19:36.678726 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:19:36.678777 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:19:36.678829 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:19:36.678878 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:19:36.678887 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Dec 13 14:19:36.678893 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Dec 13 14:19:36.678899 kernel: ACPI: PCI: Interrupt link LNKB disabled Dec 13 14:19:36.678905 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:19:36.678911 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Dec 13 14:19:36.678917 kernel: iommu: Default domain type: Translated Dec 13 14:19:36.678922 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:19:36.678975 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Dec 13 14:19:36.679024 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:19:36.679074 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Dec 13 14:19:36.679083 kernel: vgaarb: loaded Dec 13 14:19:36.679089 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:19:36.679095 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:19:36.679101 kernel: PTP clock support registered Dec 13 14:19:36.679106 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:19:36.679112 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:19:36.679120 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Dec 13 14:19:36.679126 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Dec 13 14:19:36.679132 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Dec 13 14:19:36.679138 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Dec 13 14:19:36.679143 kernel: clocksource: Switched to clocksource tsc-early Dec 13 14:19:36.679150 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:19:36.679156 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:19:36.679161 kernel: pnp: PnP ACPI init Dec 13 14:19:36.679214 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Dec 13 14:19:36.679263 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Dec 13 14:19:36.679310 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Dec 13 14:19:36.679359 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Dec 13 14:19:36.679409 kernel: pnp 00:06: [dma 2] Dec 13 14:19:36.683291 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Dec 13 14:19:36.683356 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Dec 13 14:19:36.683401 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Dec 13 14:19:36.683409 kernel: pnp: PnP ACPI: found 8 devices Dec 13 14:19:36.683416 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:19:36.683422 kernel: NET: Registered PF_INET protocol family Dec 13 14:19:36.683443 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:19:36.683452 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:19:36.683458 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:19:36.683463 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:19:36.683471 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:19:36.683476 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:19:36.683482 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:19:36.683487 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:19:36.683493 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:19:36.683499 kernel: NET: Registered PF_XDP protocol family Dec 13 14:19:36.683553 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Dec 13 14:19:36.683603 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 14:19:36.683653 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 14:19:36.683702 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 14:19:36.683750 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 14:19:36.683798 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Dec 13 14:19:36.683845 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Dec 13 14:19:36.683893 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Dec 13 14:19:36.683943 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Dec 13 14:19:36.683991 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Dec 13 14:19:36.684037 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Dec 13 14:19:36.684083 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Dec 13 14:19:36.684129 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Dec 13 14:19:36.684175 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Dec 13 14:19:36.684224 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Dec 13 14:19:36.684270 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Dec 13 14:19:36.684315 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Dec 13 14:19:36.684360 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Dec 13 14:19:36.684406 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Dec 13 14:19:36.684470 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Dec 13 14:19:36.684516 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Dec 13 14:19:36.684563 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Dec 13 14:19:36.684609 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Dec 13 14:19:36.684655 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:19:36.684700 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:19:36.684746 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.684794 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.684840 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.684884 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.684929 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.684974 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685019 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685066 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685112 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685158 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685204 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685248 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685294 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685340 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685385 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685435 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685482 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685530 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685575 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685620 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685665 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685710 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685755 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685800 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685845 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685891 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.685937 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.685981 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.686027 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.686071 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.686118 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.686166 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.686213 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.686279 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.686340 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.686384 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.689667 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.689735 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.689784 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.689830 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.689876 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.689979 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.690030 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.690076 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.690122 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.690167 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.690213 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.690258 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.690304 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.690350 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.690400 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.690528 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.690576 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.690622 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.690669 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.690715 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.690760 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.690806 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.690853 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.690900 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.691048 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.691356 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.691412 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.691477 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.691530 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.691580 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.691632 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.691683 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.691733 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.691787 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.691838 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.691889 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.691940 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.691989 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.692038 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.692089 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.692140 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.692190 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.692240 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.692293 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.692344 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.692393 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.692456 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:19:36.692508 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:19:36.692560 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:19:36.692612 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Dec 13 14:19:36.692662 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:19:36.692714 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:19:36.693771 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:19:36.693828 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Dec 13 14:19:36.693879 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:19:36.693927 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:19:36.693974 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:19:36.694020 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:19:36.694068 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:19:36.694115 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:19:36.694164 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:19:36.694211 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:19:36.694259 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:19:36.694306 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:19:36.694352 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:19:36.694398 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:19:36.694579 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:19:36.694629 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:19:36.694897 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:19:36.694954 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:19:36.695005 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:19:36.695061 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:19:36.695113 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:19:36.695161 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:19:36.695208 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:19:36.695255 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:19:36.695303 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:19:36.695350 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:19:36.695396 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:19:36.695714 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:19:36.695771 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:19:36.695824 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Dec 13 14:19:36.695882 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:19:36.695933 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:19:36.695980 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:19:36.696028 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:19:36.696076 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:19:36.696123 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:19:36.696173 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:19:36.696220 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:19:36.696268 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:19:36.696315 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:19:36.696361 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:19:36.696407 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:19:36.696673 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:19:36.696725 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:19:36.696773 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:19:36.696828 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:19:36.696879 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:19:36.696927 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:19:36.696975 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:19:36.697022 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:19:36.697069 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:19:36.697115 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:19:36.697165 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:19:36.697212 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:19:36.697260 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:19:36.697306 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:19:36.697352 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:19:36.697400 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:19:36.697697 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:19:36.697751 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:19:36.697799 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:19:36.697866 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:19:36.697913 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:19:36.697960 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:19:36.698006 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:19:36.698053 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:19:36.698100 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:19:36.698147 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:19:36.698198 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:19:36.698253 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:19:36.698309 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:19:36.698358 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:19:36.698405 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:19:36.698503 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:19:36.698551 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:19:36.698597 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:19:36.698643 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:19:36.698689 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:19:36.698734 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:19:36.698779 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:19:36.698828 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:19:36.698874 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:19:36.698920 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:19:36.699140 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:19:36.699192 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:19:36.699240 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:19:36.699286 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:19:36.699633 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:19:36.699689 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:19:36.699738 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:19:36.699953 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:19:36.700014 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:19:36.700063 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:19:36.700112 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:19:36.700159 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:19:36.700405 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:19:36.700502 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:19:36.700553 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:19:36.700603 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:19:36.700653 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:19:36.700699 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:19:36.700746 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:19:36.700792 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:19:36.700838 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:19:36.700884 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:19:36.700929 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:19:36.700975 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:19:36.701026 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:19:36.701073 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:19:36.701130 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:19:36.701181 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:19:36.701223 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:19:36.701263 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:19:36.701303 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:19:36.701342 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:19:36.701384 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:19:36.701427 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:19:36.701698 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:19:36.702041 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Dec 13 14:19:36.702095 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Dec 13 14:19:36.702351 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:19:36.702402 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:19:36.702479 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:19:36.702526 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:19:36.702573 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:19:36.702614 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:19:36.702656 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:19:36.702697 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:19:36.702738 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:19:36.702786 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Dec 13 14:19:36.702828 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Dec 13 14:19:36.702872 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:19:36.702918 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Dec 13 14:19:36.702960 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Dec 13 14:19:36.703002 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:19:36.703048 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Dec 13 14:19:36.703090 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Dec 13 14:19:36.703133 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:19:36.703179 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Dec 13 14:19:36.703221 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:19:36.703269 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Dec 13 14:19:36.703319 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:19:36.703369 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Dec 13 14:19:36.703413 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:19:36.703679 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Dec 13 14:19:36.703728 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:19:36.703777 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Dec 13 14:19:36.703825 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:19:36.703874 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Dec 13 14:19:36.703919 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Dec 13 14:19:36.703962 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:19:36.704009 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Dec 13 14:19:36.704052 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Dec 13 14:19:36.704095 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:19:36.704141 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Dec 13 14:19:36.704188 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Dec 13 14:19:36.704234 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:19:36.704283 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Dec 13 14:19:36.704327 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:19:36.704373 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Dec 13 14:19:36.704416 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:19:36.704709 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Dec 13 14:19:36.704761 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:19:36.704811 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Dec 13 14:19:36.704875 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:19:36.705130 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Dec 13 14:19:36.705179 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:19:36.705227 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Dec 13 14:19:36.705274 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Dec 13 14:19:36.705320 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:19:36.705367 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Dec 13 14:19:36.705409 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Dec 13 14:19:36.705690 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:19:36.705745 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Dec 13 14:19:36.706003 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Dec 13 14:19:36.706053 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:19:36.706101 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Dec 13 14:19:36.706149 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:19:36.706196 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Dec 13 14:19:36.706239 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:19:36.706285 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Dec 13 14:19:36.706330 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:19:36.706379 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Dec 13 14:19:36.706421 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:19:36.706690 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Dec 13 14:19:36.706737 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:19:36.706786 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Dec 13 14:19:36.706837 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Dec 13 14:19:36.706880 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:19:36.706926 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Dec 13 14:19:36.706969 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Dec 13 14:19:36.707012 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:19:36.707059 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Dec 13 14:19:36.707102 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:19:36.707150 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Dec 13 14:19:36.707202 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:19:36.707250 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Dec 13 14:19:36.707294 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:19:36.707340 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Dec 13 14:19:36.707384 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:19:36.707665 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Dec 13 14:19:36.707720 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:19:36.707769 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Dec 13 14:19:36.707813 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:19:36.707869 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:19:36.707879 kernel: PCI: CLS 32 bytes, default 64 Dec 13 14:19:36.707885 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:19:36.707894 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:19:36.707900 kernel: clocksource: Switched to clocksource tsc Dec 13 14:19:36.707906 kernel: Initialise system trusted keyrings Dec 13 14:19:36.707912 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:19:36.707919 kernel: Key type asymmetric registered Dec 13 14:19:36.707925 kernel: Asymmetric key parser 'x509' registered Dec 13 14:19:36.707930 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:19:36.707937 kernel: io scheduler mq-deadline registered Dec 13 14:19:36.707943 kernel: io scheduler kyber registered Dec 13 14:19:36.707950 kernel: io scheduler bfq registered Dec 13 14:19:36.707998 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Dec 13 14:19:36.708047 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.708095 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Dec 13 14:19:36.708143 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.708202 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Dec 13 14:19:36.708252 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.708300 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Dec 13 14:19:36.708351 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.708400 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Dec 13 14:19:36.708666 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.708721 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Dec 13 14:19:36.708771 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.708823 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Dec 13 14:19:36.708877 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.708924 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Dec 13 14:19:36.708972 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.709018 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Dec 13 14:19:36.709065 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.709114 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Dec 13 14:19:36.709160 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.709207 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Dec 13 14:19:36.709253 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.709300 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Dec 13 14:19:36.709346 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.709396 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Dec 13 14:19:36.709685 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.709740 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Dec 13 14:19:36.709789 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.710052 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Dec 13 14:19:36.710107 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.710157 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Dec 13 14:19:36.710209 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.710257 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Dec 13 14:19:36.710304 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.710351 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Dec 13 14:19:36.710396 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.710698 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Dec 13 14:19:36.710965 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.711020 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Dec 13 14:19:36.711069 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.711122 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Dec 13 14:19:36.711174 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.711225 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Dec 13 14:19:36.711272 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.711319 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Dec 13 14:19:36.711366 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.711413 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Dec 13 14:19:36.711745 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.712009 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Dec 13 14:19:36.712064 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.712114 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Dec 13 14:19:36.712166 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.712213 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Dec 13 14:19:36.712263 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.712308 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Dec 13 14:19:36.712355 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.712401 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Dec 13 14:19:36.712670 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.712724 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Dec 13 14:19:36.712986 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.713039 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Dec 13 14:19:36.713088 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.713136 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Dec 13 14:19:36.713184 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:19:36.713195 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:19:36.713202 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:19:36.713208 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:19:36.713215 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Dec 13 14:19:36.713221 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:19:36.713227 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:19:36.713275 kernel: rtc_cmos 00:01: registered as rtc0 Dec 13 14:19:36.713319 kernel: rtc_cmos 00:01: setting system clock to 2024-12-13T14:19:36 UTC (1734099576) Dec 13 14:19:36.713364 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Dec 13 14:19:36.713372 kernel: fail to initialize ptp_kvm Dec 13 14:19:36.713379 kernel: intel_pstate: CPU model not supported Dec 13 14:19:36.713385 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:19:36.713391 kernel: Segment Routing with IPv6 Dec 13 14:19:36.713397 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:19:36.713403 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:19:36.713409 kernel: Key type dns_resolver registered Dec 13 14:19:36.713416 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:19:36.713423 kernel: IPI shorthand broadcast: enabled Dec 13 14:19:36.713462 kernel: sched_clock: Marking stable (885351316, 221390638)->(1174454374, -67712420) Dec 13 14:19:36.713469 kernel: registered taskstats version 1 Dec 13 14:19:36.713475 kernel: Loading compiled-in X.509 certificates Dec 13 14:19:36.713481 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:19:36.713487 kernel: Key type .fscrypt registered Dec 13 14:19:36.713493 kernel: Key type fscrypt-provisioning registered Dec 13 14:19:36.713500 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:19:36.713507 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:19:36.713513 kernel: ima: No architecture policies found Dec 13 14:19:36.713519 kernel: clk: Disabling unused clocks Dec 13 14:19:36.713526 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:19:36.713532 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:19:36.713538 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:19:36.713544 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:19:36.713551 kernel: Run /init as init process Dec 13 14:19:36.713557 kernel: with arguments: Dec 13 14:19:36.713564 kernel: /init Dec 13 14:19:36.713570 kernel: with environment: Dec 13 14:19:36.713576 kernel: HOME=/ Dec 13 14:19:36.713582 kernel: TERM=linux Dec 13 14:19:36.713588 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:19:36.713595 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:19:36.713603 systemd[1]: Detected virtualization vmware. Dec 13 14:19:36.713610 systemd[1]: Detected architecture x86-64. Dec 13 14:19:36.713616 systemd[1]: Running in initrd. Dec 13 14:19:36.713623 systemd[1]: No hostname configured, using default hostname. Dec 13 14:19:36.713629 systemd[1]: Hostname set to . Dec 13 14:19:36.713635 systemd[1]: Initializing machine ID from random generator. Dec 13 14:19:36.713642 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:19:36.713648 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:19:36.713654 systemd[1]: Reached target cryptsetup.target. Dec 13 14:19:36.713660 systemd[1]: Reached target paths.target. Dec 13 14:19:36.713666 systemd[1]: Reached target slices.target. Dec 13 14:19:36.713673 systemd[1]: Reached target swap.target. Dec 13 14:19:36.713679 systemd[1]: Reached target timers.target. Dec 13 14:19:36.713686 systemd[1]: Listening on iscsid.socket. Dec 13 14:19:36.713692 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:19:36.713699 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:19:36.713705 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:19:36.713711 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:19:36.713718 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:19:36.713724 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:19:36.713732 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:19:36.713738 systemd[1]: Reached target sockets.target. Dec 13 14:19:36.713744 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:19:36.713750 systemd[1]: Finished network-cleanup.service. Dec 13 14:19:36.713756 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:19:36.713762 systemd[1]: Starting systemd-journald.service... Dec 13 14:19:36.713769 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:19:36.713776 systemd[1]: Starting systemd-resolved.service... Dec 13 14:19:36.713782 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:19:36.713788 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:19:36.713795 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:19:36.713801 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:19:36.713808 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:19:36.713814 kernel: audit: type=1130 audit(1734099576.650:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.713820 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:19:36.713827 kernel: audit: type=1130 audit(1734099576.654:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.713834 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:19:36.713840 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:19:36.713846 kernel: audit: type=1130 audit(1734099576.678:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.713852 systemd[1]: Started systemd-resolved.service. Dec 13 14:19:36.713859 kernel: audit: type=1130 audit(1734099576.685:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.713865 systemd[1]: Reached target nss-lookup.target. Dec 13 14:19:36.713871 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:19:36.713878 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:19:36.713885 kernel: Bridge firewalling registered Dec 13 14:19:36.713894 systemd-journald[217]: Journal started Dec 13 14:19:36.713926 systemd-journald[217]: Runtime Journal (/run/log/journal/76ee457c63ce41359e77f40b6b906788) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:19:36.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.654821 systemd-modules-load[218]: Inserted module 'overlay' Dec 13 14:19:36.723497 systemd[1]: Started systemd-journald.service. Dec 13 14:19:36.723510 kernel: audit: type=1130 audit(1734099576.713:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.723519 kernel: SCSI subsystem initialized Dec 13 14:19:36.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.672344 systemd-resolved[219]: Positive Trust Anchors: Dec 13 14:19:36.672351 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:19:36.672371 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:19:36.674024 systemd-resolved[219]: Defaulting to hostname 'linux'. Dec 13 14:19:36.701112 systemd-modules-load[218]: Inserted module 'br_netfilter' Dec 13 14:19:36.727482 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:19:36.727537 dracut-cmdline[232]: dracut-dracut-053 Dec 13 14:19:36.727537 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 14:19:36.727537 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:19:36.730421 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:19:36.730450 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:19:36.733426 systemd-modules-load[218]: Inserted module 'dm_multipath' Dec 13 14:19:36.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.733922 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:19:36.736590 kernel: audit: type=1130 audit(1734099576.732:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.736711 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:19:36.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.740144 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:19:36.743443 kernel: audit: type=1130 audit(1734099576.738:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.753444 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:19:36.765445 kernel: iscsi: registered transport (tcp) Dec 13 14:19:36.780448 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:19:36.780480 kernel: QLogic iSCSI HBA Driver Dec 13 14:19:36.796463 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:19:36.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.797064 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:19:36.799641 kernel: audit: type=1130 audit(1734099576.795:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:36.833477 kernel: raid6: avx2x4 gen() 47790 MB/s Dec 13 14:19:36.850478 kernel: raid6: avx2x4 xor() 20697 MB/s Dec 13 14:19:36.867477 kernel: raid6: avx2x2 gen() 51703 MB/s Dec 13 14:19:36.884441 kernel: raid6: avx2x2 xor() 31371 MB/s Dec 13 14:19:36.901470 kernel: raid6: avx2x1 gen() 44825 MB/s Dec 13 14:19:36.918447 kernel: raid6: avx2x1 xor() 27634 MB/s Dec 13 14:19:36.935442 kernel: raid6: sse2x4 gen() 21254 MB/s Dec 13 14:19:36.952446 kernel: raid6: sse2x4 xor() 11908 MB/s Dec 13 14:19:36.969452 kernel: raid6: sse2x2 gen() 21105 MB/s Dec 13 14:19:36.986448 kernel: raid6: sse2x2 xor() 13184 MB/s Dec 13 14:19:37.003448 kernel: raid6: sse2x1 gen() 17954 MB/s Dec 13 14:19:37.020664 kernel: raid6: sse2x1 xor() 8822 MB/s Dec 13 14:19:37.020707 kernel: raid6: using algorithm avx2x2 gen() 51703 MB/s Dec 13 14:19:37.020720 kernel: raid6: .... xor() 31371 MB/s, rmw enabled Dec 13 14:19:37.021844 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:19:37.030471 kernel: xor: automatically using best checksumming function avx Dec 13 14:19:37.090446 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:19:37.094936 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:19:37.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:37.095547 systemd[1]: Starting systemd-udevd.service... Dec 13 14:19:37.093000 audit: BPF prog-id=7 op=LOAD Dec 13 14:19:37.093000 audit: BPF prog-id=8 op=LOAD Dec 13 14:19:37.100442 kernel: audit: type=1130 audit(1734099577.093:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:37.105497 systemd-udevd[415]: Using default interface naming scheme 'v252'. Dec 13 14:19:37.108155 systemd[1]: Started systemd-udevd.service. Dec 13 14:19:37.108682 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:19:37.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:37.116427 dracut-pre-trigger[420]: rd.md=0: removing MD RAID activation Dec 13 14:19:37.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:37.131860 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:19:37.132369 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:19:37.191839 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:19:37.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:37.258441 kernel: VMware PVSCSI driver - version 1.0.7.0-k Dec 13 14:19:37.259443 kernel: libata version 3.00 loaded. Dec 13 14:19:37.267448 kernel: ata_piix 0000:00:07.1: version 2.13 Dec 13 14:19:37.294674 kernel: vmw_pvscsi: using 64bit dma Dec 13 14:19:37.294686 kernel: vmw_pvscsi: max_id: 16 Dec 13 14:19:37.294693 kernel: vmw_pvscsi: setting ring_pages to 8 Dec 13 14:19:37.294700 kernel: scsi host0: ata_piix Dec 13 14:19:37.294773 kernel: vmw_pvscsi: enabling reqCallThreshold Dec 13 14:19:37.294781 kernel: vmw_pvscsi: driver-based request coalescing enabled Dec 13 14:19:37.294790 kernel: vmw_pvscsi: using MSI-X Dec 13 14:19:37.294798 kernel: scsi host1: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Dec 13 14:19:37.294861 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #1 Dec 13 14:19:37.294936 kernel: scsi 1:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Dec 13 14:19:37.295004 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Dec 13 14:19:37.295012 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Dec 13 14:19:37.295073 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Dec 13 14:19:37.295130 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Dec 13 14:19:37.295188 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:19:37.295196 kernel: scsi host2: ata_piix Dec 13 14:19:37.295259 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Dec 13 14:19:37.295267 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Dec 13 14:19:37.467446 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Dec 13 14:19:37.470482 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Dec 13 14:19:37.478667 kernel: sd 1:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Dec 13 14:19:37.527280 kernel: sd 1:0:0:0: [sda] Write Protect is off Dec 13 14:19:37.527355 kernel: sd 1:0:0:0: [sda] Mode Sense: 31 00 00 00 Dec 13 14:19:37.527415 kernel: sd 1:0:0:0: [sda] Cache data unavailable Dec 13 14:19:37.527485 kernel: sd 1:0:0:0: [sda] Assuming drive cache: write through Dec 13 14:19:37.527542 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:19:37.527551 kernel: AES CTR mode by8 optimization enabled Dec 13 14:19:37.527558 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:19:37.527565 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Dec 13 14:19:37.550010 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Dec 13 14:19:37.567542 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:19:37.567557 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:19:37.624448 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (469) Dec 13 14:19:37.625296 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:19:37.627032 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:19:37.628341 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:19:37.629023 systemd[1]: Starting disk-uuid.service... Dec 13 14:19:37.631168 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:19:37.633314 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:19:37.655446 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:19:37.659001 kernel: GPT:disk_guids don't match. Dec 13 14:19:37.659024 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:19:37.659033 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:19:38.663811 disk-uuid[548]: The operation has completed successfully. Dec 13 14:19:38.664451 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:19:38.698542 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:19:38.698598 systemd[1]: Finished disk-uuid.service. Dec 13 14:19:38.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:38.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:38.699164 systemd[1]: Starting verity-setup.service... Dec 13 14:19:38.708469 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:19:38.787459 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:19:38.787986 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:19:38.788638 systemd[1]: Finished verity-setup.service. Dec 13 14:19:38.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:38.906477 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:19:38.906951 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:19:38.907552 systemd[1]: Starting afterburn-network-kargs.service... Dec 13 14:19:38.908011 systemd[1]: Starting ignition-setup.service... Dec 13 14:19:38.923570 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:19:38.923608 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:19:38.923617 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:19:38.928976 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:19:38.933001 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:19:38.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:38.937902 systemd[1]: Finished ignition-setup.service. Dec 13 14:19:38.938518 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:19:38.987713 systemd[1]: Finished afterburn-network-kargs.service. Dec 13 14:19:38.988324 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:19:38.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.034269 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:19:39.035145 systemd[1]: Starting systemd-networkd.service... Dec 13 14:19:39.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.033000 audit: BPF prog-id=9 op=LOAD Dec 13 14:19:39.050618 systemd-networkd[734]: lo: Link UP Dec 13 14:19:39.050624 systemd-networkd[734]: lo: Gained carrier Dec 13 14:19:39.050908 systemd-networkd[734]: Enumeration completed Dec 13 14:19:39.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.051093 systemd-networkd[734]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Dec 13 14:19:39.051125 systemd[1]: Started systemd-networkd.service. Dec 13 14:19:39.051264 systemd[1]: Reached target network.target. Dec 13 14:19:39.051847 systemd[1]: Starting iscsiuio.service... Dec 13 14:19:39.055725 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:19:39.055877 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:19:39.056009 systemd[1]: Started iscsiuio.service. Dec 13 14:19:39.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.057144 systemd-networkd[734]: ens192: Link UP Dec 13 14:19:39.057148 systemd-networkd[734]: ens192: Gained carrier Dec 13 14:19:39.057906 systemd[1]: Starting iscsid.service... Dec 13 14:19:39.059441 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:19:39.059441 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:19:39.059441 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:19:39.059441 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:19:39.060379 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:19:39.060379 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:19:39.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.060296 systemd[1]: Started iscsid.service. Dec 13 14:19:39.062166 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:19:39.069132 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:19:39.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.069901 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:19:39.070126 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:19:39.070339 systemd[1]: Reached target remote-fs.target. Dec 13 14:19:39.071295 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:19:39.076181 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:19:39.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.089125 ignition[605]: Ignition 2.14.0 Dec 13 14:19:39.089133 ignition[605]: Stage: fetch-offline Dec 13 14:19:39.089166 ignition[605]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:19:39.089182 ignition[605]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:19:39.091676 ignition[605]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:19:39.091743 ignition[605]: parsed url from cmdline: "" Dec 13 14:19:39.091746 ignition[605]: no config URL provided Dec 13 14:19:39.091748 ignition[605]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:19:39.091753 ignition[605]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:19:39.092106 ignition[605]: config successfully fetched Dec 13 14:19:39.092114 ignition[605]: parsing config with SHA512: d7c87bcca5e3a33af6e393fada5f7e7cc5b33def5490accae5befbc94c95aa1403d4f09ab5c7083379b78755bf367b01ac0c27f2afde5be240df96863c5954db Dec 13 14:19:39.099410 unknown[605]: fetched base config from "system" Dec 13 14:19:39.099416 unknown[605]: fetched user config from "vmware" Dec 13 14:19:39.099875 ignition[605]: fetch-offline: fetch-offline passed Dec 13 14:19:39.100585 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:19:39.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.099921 ignition[605]: Ignition finished successfully Dec 13 14:19:39.100747 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:19:39.101199 systemd[1]: Starting ignition-kargs.service... Dec 13 14:19:39.106342 ignition[753]: Ignition 2.14.0 Dec 13 14:19:39.106580 ignition[753]: Stage: kargs Dec 13 14:19:39.106747 ignition[753]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:19:39.106907 ignition[753]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:19:39.108232 ignition[753]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:19:39.109740 ignition[753]: kargs: kargs passed Dec 13 14:19:39.109785 ignition[753]: Ignition finished successfully Dec 13 14:19:39.110702 systemd[1]: Finished ignition-kargs.service. Dec 13 14:19:39.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.111310 systemd[1]: Starting ignition-disks.service... Dec 13 14:19:39.115885 ignition[759]: Ignition 2.14.0 Dec 13 14:19:39.116128 ignition[759]: Stage: disks Dec 13 14:19:39.116302 ignition[759]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:19:39.116489 ignition[759]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:19:39.117992 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:19:39.119315 ignition[759]: disks: disks passed Dec 13 14:19:39.119491 ignition[759]: Ignition finished successfully Dec 13 14:19:39.120084 systemd[1]: Finished ignition-disks.service. Dec 13 14:19:39.120298 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:19:39.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.120411 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:19:39.120586 systemd[1]: Reached target local-fs.target. Dec 13 14:19:39.120744 systemd[1]: Reached target sysinit.target. Dec 13 14:19:39.120898 systemd[1]: Reached target basic.target. Dec 13 14:19:39.121541 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:19:39.166373 systemd-resolved[219]: Detected conflict on linux IN A 139.178.70.103 Dec 13 14:19:39.166384 systemd-resolved[219]: Hostname conflict, changing published hostname from 'linux' to 'linux3'. Dec 13 14:19:39.172363 systemd-fsck[767]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:19:39.173891 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:19:39.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.174483 systemd[1]: Mounting sysroot.mount... Dec 13 14:19:39.181444 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:19:39.181692 systemd[1]: Mounted sysroot.mount. Dec 13 14:19:39.181823 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:19:39.182722 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:19:39.183069 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:19:39.183099 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:19:39.183115 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:19:39.184889 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:19:39.185357 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:19:39.188134 initrd-setup-root[777]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:19:39.191664 initrd-setup-root[785]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:19:39.193516 initrd-setup-root[793]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:19:39.195701 initrd-setup-root[801]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:19:39.225389 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:19:39.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.225973 systemd[1]: Starting ignition-mount.service... Dec 13 14:19:39.226413 systemd[1]: Starting sysroot-boot.service... Dec 13 14:19:39.230417 bash[818]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:19:39.235604 ignition[819]: INFO : Ignition 2.14.0 Dec 13 14:19:39.235854 ignition[819]: INFO : Stage: mount Dec 13 14:19:39.236036 ignition[819]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:19:39.236192 ignition[819]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:19:39.237730 ignition[819]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:19:39.239296 ignition[819]: INFO : mount: mount passed Dec 13 14:19:39.239475 ignition[819]: INFO : Ignition finished successfully Dec 13 14:19:39.240053 systemd[1]: Finished ignition-mount.service. Dec 13 14:19:39.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.246558 systemd[1]: Finished sysroot-boot.service. Dec 13 14:19:39.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:39.804013 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:19:39.818496 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (828) Dec 13 14:19:39.821285 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:19:39.821311 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:19:39.821322 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:19:39.832463 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:19:39.834067 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:19:39.834949 systemd[1]: Starting ignition-files.service... Dec 13 14:19:39.848614 ignition[848]: INFO : Ignition 2.14.0 Dec 13 14:19:39.848614 ignition[848]: INFO : Stage: files Dec 13 14:19:39.848969 ignition[848]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:19:39.848969 ignition[848]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:19:39.849938 ignition[848]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:19:39.851857 ignition[848]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:19:39.852384 ignition[848]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:19:39.852384 ignition[848]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:19:39.854102 ignition[848]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:19:39.854319 ignition[848]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:19:39.855106 unknown[848]: wrote ssh authorized keys file for user: core Dec 13 14:19:39.855309 ignition[848]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:19:39.855604 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:19:39.855765 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:19:39.855921 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:19:39.855921 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:19:39.855921 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:19:39.856458 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:19:39.856458 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:19:39.856458 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:19:39.862303 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2699960654" Dec 13 14:19:39.863770 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (848) Dec 13 14:19:39.863789 ignition[848]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2699960654": device or resource busy Dec 13 14:19:39.863789 ignition[848]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2699960654", trying btrfs: device or resource busy Dec 13 14:19:39.863789 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2699960654" Dec 13 14:19:39.863789 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2699960654" Dec 13 14:19:39.863789 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem2699960654" Dec 13 14:19:39.863789 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem2699960654" Dec 13 14:19:39.863789 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:19:39.863789 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:19:39.865305 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:19:40.228712 systemd-networkd[734]: ens192: Gained IPv6LL Dec 13 14:19:45.193663 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 14:19:45.375206 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:19:45.375494 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:19:45.375674 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:19:45.375674 ignition[848]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:19:45.432510 ignition[848]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:19:45.432742 ignition[848]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:19:45.432742 ignition[848]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:19:45.432742 ignition[848]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:19:45.432742 ignition[848]: INFO : files: files passed Dec 13 14:19:45.432742 ignition[848]: INFO : Ignition finished successfully Dec 13 14:19:45.436722 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:19:45.436760 kernel: audit: type=1130 audit(1734099585.433:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.434684 systemd[1]: Finished ignition-files.service. Dec 13 14:19:45.435427 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:19:45.438031 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:19:45.438496 systemd[1]: Starting ignition-quench.service... Dec 13 14:19:45.446028 initrd-setup-root-after-ignition[874]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:19:45.445979 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:19:45.451111 kernel: audit: type=1130 audit(1734099585.444:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.451133 kernel: audit: type=1131 audit(1734099585.444:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.446045 systemd[1]: Finished ignition-quench.service. Dec 13 14:19:45.453799 kernel: audit: type=1130 audit(1734099585.449:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.446534 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:19:45.451250 systemd[1]: Reached target ignition-complete.target. Dec 13 14:19:45.454328 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:19:45.462809 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:19:45.463047 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:19:45.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.465803 systemd[1]: Reached target initrd-fs.target. Dec 13 14:19:45.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.468442 kernel: audit: type=1130 audit(1734099585.461:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.468464 kernel: audit: type=1131 audit(1734099585.464:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.468506 systemd[1]: Reached target initrd.target. Dec 13 14:19:45.468642 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:19:45.469179 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:19:45.476606 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:19:45.477359 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:19:45.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.480437 kernel: audit: type=1130 audit(1734099585.475:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.483367 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:19:45.483676 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:19:45.483954 systemd[1]: Stopped target timers.target. Dec 13 14:19:45.484224 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:19:45.484433 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:19:45.484754 systemd[1]: Stopped target initrd.target. Dec 13 14:19:45.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.487392 systemd[1]: Stopped target basic.target. Dec 13 14:19:45.487511 kernel: audit: type=1131 audit(1734099585.483:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.487664 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:19:45.487929 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:19:45.488222 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:19:45.488505 systemd[1]: Stopped target remote-fs.target. Dec 13 14:19:45.488756 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:19:45.489021 systemd[1]: Stopped target sysinit.target. Dec 13 14:19:45.489277 systemd[1]: Stopped target local-fs.target. Dec 13 14:19:45.489538 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:19:45.489798 systemd[1]: Stopped target swap.target. Dec 13 14:19:45.490035 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:19:45.490244 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:19:45.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.490600 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:19:45.493093 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:19:45.493304 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:19:45.493442 kernel: audit: type=1131 audit(1734099585.489:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.493675 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:19:45.493762 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:19:45.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.496371 systemd[1]: Stopped target paths.target. Dec 13 14:19:45.496495 kernel: audit: type=1131 audit(1734099585.492:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.496629 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:19:45.500451 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:19:45.500730 systemd[1]: Stopped target slices.target. Dec 13 14:19:45.500980 systemd[1]: Stopped target sockets.target. Dec 13 14:19:45.501228 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:19:45.501402 systemd[1]: Closed iscsid.socket. Dec 13 14:19:45.501654 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:19:45.501830 systemd[1]: Closed iscsiuio.socket. Dec 13 14:19:45.502084 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:19:45.502297 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:19:45.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.502630 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:19:45.502827 systemd[1]: Stopped ignition-files.service. Dec 13 14:19:45.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.503604 systemd[1]: Stopping ignition-mount.service... Dec 13 14:19:45.503896 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:19:45.504093 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:19:45.504745 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:19:45.504970 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:19:45.505180 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:19:45.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.505571 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:19:45.505806 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:19:45.507729 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:19:45.507942 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:19:45.509354 ignition[887]: INFO : Ignition 2.14.0 Dec 13 14:19:45.509354 ignition[887]: INFO : Stage: umount Dec 13 14:19:45.509354 ignition[887]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:19:45.509354 ignition[887]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:19:45.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.511448 ignition[887]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:19:45.513450 ignition[887]: INFO : umount: umount passed Dec 13 14:19:45.513581 ignition[887]: INFO : Ignition finished successfully Dec 13 14:19:45.514687 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:19:45.514752 systemd[1]: Stopped ignition-mount.service. Dec 13 14:19:45.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.514954 systemd[1]: Stopped target network.target. Dec 13 14:19:45.515090 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:19:45.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.515113 systemd[1]: Stopped ignition-disks.service. Dec 13 14:19:45.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.515271 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:19:45.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.515294 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:19:45.515460 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:19:45.515489 systemd[1]: Stopped ignition-setup.service. Dec 13 14:19:45.515666 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:19:45.515879 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:19:45.519914 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:19:45.522985 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:19:45.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.523040 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:19:45.524748 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:19:45.524808 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:19:45.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.525314 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:19:45.525343 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:19:45.525000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:19:45.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.526288 systemd[1]: Stopping network-cleanup.service... Dec 13 14:19:45.526395 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:19:45.526000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:19:45.526423 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:19:45.526601 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Dec 13 14:19:45.526623 systemd[1]: Stopped afterburn-network-kargs.service. Dec 13 14:19:45.526731 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:19:45.526750 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:19:45.526901 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:19:45.526922 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:19:45.527064 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:19:45.527870 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:19:45.529803 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:19:45.529857 systemd[1]: Stopped network-cleanup.service. Dec 13 14:19:45.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.533030 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:19:45.533104 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:19:45.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.533422 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:19:45.533456 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:19:45.533662 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:19:45.533678 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:19:45.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.533815 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:19:45.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.533835 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:19:45.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.534009 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:19:45.534028 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:19:45.534166 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:19:45.534185 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:19:45.534691 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:19:45.536526 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:19:45.536554 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:19:45.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.537892 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:19:45.537935 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:19:45.559076 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:19:45.559147 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:19:45.559484 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:19:45.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.559628 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:19:45.559659 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:19:45.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:45.560376 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:19:45.569014 systemd[1]: Switching root. Dec 13 14:19:45.584988 systemd-journald[217]: Journal stopped Dec 13 14:19:48.948737 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Dec 13 14:19:48.948757 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:19:48.948765 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:19:48.948772 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:19:48.948777 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:19:48.948784 kernel: SELinux: policy capability open_perms=1 Dec 13 14:19:48.948790 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:19:48.948796 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:19:48.948802 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:19:48.948807 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:19:48.948813 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:19:48.948819 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:19:48.948826 systemd[1]: Successfully loaded SELinux policy in 132.579ms. Dec 13 14:19:48.948834 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.127ms. Dec 13 14:19:48.948842 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:19:48.948849 systemd[1]: Detected virtualization vmware. Dec 13 14:19:48.948857 systemd[1]: Detected architecture x86-64. Dec 13 14:19:48.948863 systemd[1]: Detected first boot. Dec 13 14:19:48.948870 systemd[1]: Initializing machine ID from random generator. Dec 13 14:19:48.948877 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:19:48.948883 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:19:48.948890 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:19:48.948897 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:19:48.948905 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:19:48.948913 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:19:48.948919 systemd[1]: Stopped iscsiuio.service. Dec 13 14:19:48.948926 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:19:48.948933 systemd[1]: Stopped iscsid.service. Dec 13 14:19:48.948939 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:19:48.948946 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:19:48.948953 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:19:48.948960 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:19:48.948967 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:19:48.948974 systemd[1]: Created slice system-getty.slice. Dec 13 14:19:48.948980 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:19:48.948987 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:19:48.948994 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:19:48.949001 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:19:48.949007 systemd[1]: Created slice user.slice. Dec 13 14:19:48.949015 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:19:48.949023 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:19:48.949541 systemd[1]: Set up automount boot.automount. Dec 13 14:19:48.949558 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:19:48.949567 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:19:48.949574 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:19:48.949581 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:19:48.949588 systemd[1]: Reached target integritysetup.target. Dec 13 14:19:48.949595 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:19:48.949604 systemd[1]: Reached target remote-fs.target. Dec 13 14:19:48.949611 systemd[1]: Reached target slices.target. Dec 13 14:19:48.949618 systemd[1]: Reached target swap.target. Dec 13 14:19:48.949624 systemd[1]: Reached target torcx.target. Dec 13 14:19:48.949632 systemd[1]: Reached target veritysetup.target. Dec 13 14:19:48.949639 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:19:48.949648 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:19:48.949655 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:19:48.949662 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:19:48.949669 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:19:48.949676 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:19:48.949683 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:19:48.949691 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:19:48.949699 systemd[1]: Mounting media.mount... Dec 13 14:19:48.949707 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:19:48.949714 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:19:48.949721 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:19:48.949728 systemd[1]: Mounting tmp.mount... Dec 13 14:19:48.949735 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:19:48.949742 systemd[1]: Starting ignition-delete-config.service... Dec 13 14:19:48.949750 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:19:48.949757 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:19:48.949765 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:19:48.949772 systemd[1]: Starting modprobe@drm.service... Dec 13 14:19:48.949779 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:19:48.949786 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:19:48.949793 systemd[1]: Starting modprobe@loop.service... Dec 13 14:19:48.949801 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:19:48.949808 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:19:48.949815 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:19:48.949822 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:19:48.949830 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:19:48.949838 systemd[1]: Stopped systemd-journald.service. Dec 13 14:19:48.949845 systemd[1]: Starting systemd-journald.service... Dec 13 14:19:48.949852 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:19:48.949859 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:19:48.949866 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:19:48.949873 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:19:48.949880 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:19:48.949887 systemd[1]: Stopped verity-setup.service. Dec 13 14:19:48.949896 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:19:48.949903 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:19:48.949910 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:19:48.949917 systemd[1]: Mounted media.mount. Dec 13 14:19:48.949925 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:19:48.949932 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:19:48.949939 systemd[1]: Mounted tmp.mount. Dec 13 14:19:48.949946 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:19:48.949953 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:19:48.949961 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:19:48.949968 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:19:48.949975 systemd[1]: Finished modprobe@drm.service. Dec 13 14:19:48.949983 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:19:48.949990 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:19:48.949997 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:19:48.950004 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:19:48.950011 systemd[1]: Reached target network-pre.target. Dec 13 14:19:48.950018 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:19:48.950026 kernel: loop: module loaded Dec 13 14:19:48.950036 systemd-journald[1001]: Journal started Dec 13 14:19:48.950065 systemd-journald[1001]: Runtime Journal (/run/log/journal/b46283eb638d452eae04f2ff915a05f2) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:19:46.006000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:19:46.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:19:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:19:46.100000 audit: BPF prog-id=10 op=LOAD Dec 13 14:19:46.100000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:19:46.100000 audit: BPF prog-id=11 op=LOAD Dec 13 14:19:46.100000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:19:46.177000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:19:46.177000 audit[921]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:46.177000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:19:46.179000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:19:46.179000 audit[921]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:46.179000 audit: CWD cwd="/" Dec 13 14:19:46.179000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:46.179000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:46.179000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:19:48.791000 audit: BPF prog-id=12 op=LOAD Dec 13 14:19:48.791000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:19:48.791000 audit: BPF prog-id=13 op=LOAD Dec 13 14:19:48.791000 audit: BPF prog-id=14 op=LOAD Dec 13 14:19:48.791000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:19:48.791000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:19:48.793000 audit: BPF prog-id=15 op=LOAD Dec 13 14:19:48.793000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:19:48.793000 audit: BPF prog-id=16 op=LOAD Dec 13 14:19:48.793000 audit: BPF prog-id=17 op=LOAD Dec 13 14:19:48.793000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:19:48.793000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:19:48.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.800000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:19:48.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.878000 audit: BPF prog-id=18 op=LOAD Dec 13 14:19:48.879000 audit: BPF prog-id=19 op=LOAD Dec 13 14:19:48.879000 audit: BPF prog-id=20 op=LOAD Dec 13 14:19:48.879000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:19:48.879000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:19:48.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.945000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:19:48.945000 audit[1001]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffeb9d3da50 a2=4000 a3=7ffeb9d3daec items=0 ppid=1 pid=1001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:48.945000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:19:46.177080 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:19:48.791781 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:19:46.177592 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:19:48.795694 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:19:46.177605 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:19:46.177626 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:19:46.177632 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:19:46.177650 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:19:46.177657 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:19:46.177783 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:19:46.177805 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:19:46.177812 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:19:46.178349 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:19:46.178370 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:19:46.178381 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:19:46.178389 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:19:46.178398 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:19:46.178406 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:19:48.198186 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:19:48.198338 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:19:48.198407 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:19:48.198531 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:19:48.198565 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:19:48.198605 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T14:19:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:19:48.956446 kernel: fuse: init (API version 7.34) Dec 13 14:19:48.958918 jq[988]: true Dec 13 14:19:48.962812 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:19:48.962835 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:19:48.966235 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:19:48.966262 systemd[1]: Started systemd-journald.service. Dec 13 14:19:48.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.966251 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:19:48.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.966881 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:19:48.972772 jq[1036]: true Dec 13 14:19:48.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.966978 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:19:48.967209 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:19:48.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.967278 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:19:48.967499 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:19:48.967564 systemd[1]: Finished modprobe@loop.service. Dec 13 14:19:48.968651 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:19:48.971225 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:19:48.973656 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:19:48.973789 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:19:48.974499 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:19:48.975287 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:19:48.975819 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:19:48.977143 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:19:48.977289 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:19:48.977493 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:19:48.978558 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:19:48.985577 systemd-journald[1001]: Time spent on flushing to /var/log/journal/b46283eb638d452eae04f2ff915a05f2 is 37.822ms for 2000 entries. Dec 13 14:19:48.985577 systemd-journald[1001]: System Journal (/var/log/journal/b46283eb638d452eae04f2ff915a05f2) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:19:49.037105 systemd-journald[1001]: Received client request to flush runtime journal. Dec 13 14:19:48.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:49.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:48.997566 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:19:49.008654 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:19:49.037624 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:19:49.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:49.065144 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:19:49.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:49.066123 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:19:49.079091 udevadm[1053]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:19:49.383774 ignition[1042]: Ignition 2.14.0 Dec 13 14:19:49.384199 ignition[1042]: deleting config from guestinfo properties Dec 13 14:19:49.387137 ignition[1042]: Successfully deleted config Dec 13 14:19:49.387798 systemd[1]: Finished ignition-delete-config.service. Dec 13 14:19:49.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:49.869185 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:19:49.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:49.868000 audit: BPF prog-id=21 op=LOAD Dec 13 14:19:49.868000 audit: BPF prog-id=22 op=LOAD Dec 13 14:19:49.868000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:19:49.868000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:19:49.870293 systemd[1]: Starting systemd-udevd.service... Dec 13 14:19:49.886231 systemd-udevd[1054]: Using default interface naming scheme 'v252'. Dec 13 14:19:49.914369 systemd[1]: Started systemd-udevd.service. Dec 13 14:19:49.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:49.913000 audit: BPF prog-id=23 op=LOAD Dec 13 14:19:49.915661 systemd[1]: Starting systemd-networkd.service... Dec 13 14:19:49.922000 audit: BPF prog-id=24 op=LOAD Dec 13 14:19:49.922000 audit: BPF prog-id=25 op=LOAD Dec 13 14:19:49.922000 audit: BPF prog-id=26 op=LOAD Dec 13 14:19:49.924177 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:19:49.956105 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:19:49.960556 systemd[1]: Started systemd-userdbd.service. Dec 13 14:19:49.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.009452 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1058) Dec 13 14:19:50.024480 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:19:50.027861 systemd-networkd[1059]: lo: Link UP Dec 13 14:19:50.027866 systemd-networkd[1059]: lo: Gained carrier Dec 13 14:19:50.028131 systemd-networkd[1059]: Enumeration completed Dec 13 14:19:50.028191 systemd[1]: Started systemd-networkd.service. Dec 13 14:19:50.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.028388 systemd-networkd[1059]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Dec 13 14:19:50.031845 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:19:50.032945 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:19:50.033028 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Dec 13 14:19:50.032959 systemd-networkd[1059]: ens192: Link UP Dec 13 14:19:50.033074 systemd-networkd[1059]: ens192: Gained carrier Dec 13 14:19:50.039440 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:19:50.080000 audit[1066]: AVC avc: denied { confidentiality } for pid=1066 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:19:50.080000 audit[1066]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562986f9f8e0 a1=337fc a2=7f211d76ebc5 a3=5 items=110 ppid=1054 pid=1066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:50.080000 audit: CWD cwd="/" Dec 13 14:19:50.080000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=1 name=(null) inode=17236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=2 name=(null) inode=17236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=3 name=(null) inode=17237 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=4 name=(null) inode=17236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=5 name=(null) inode=17238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=6 name=(null) inode=17236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=7 name=(null) inode=17239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=8 name=(null) inode=17239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=9 name=(null) inode=17240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=10 name=(null) inode=17239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=11 name=(null) inode=17241 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=12 name=(null) inode=17239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=13 name=(null) inode=17242 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=14 name=(null) inode=17239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=15 name=(null) inode=17243 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=16 name=(null) inode=17239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=17 name=(null) inode=17244 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=18 name=(null) inode=17236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=19 name=(null) inode=17245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=20 name=(null) inode=17245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=21 name=(null) inode=17246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=22 name=(null) inode=17245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=23 name=(null) inode=17247 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=24 name=(null) inode=17245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=25 name=(null) inode=17248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=26 name=(null) inode=17245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=27 name=(null) inode=17249 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=28 name=(null) inode=17245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=29 name=(null) inode=17250 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=30 name=(null) inode=17236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=31 name=(null) inode=17251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=32 name=(null) inode=17251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=33 name=(null) inode=17252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=34 name=(null) inode=17251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=35 name=(null) inode=17253 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=36 name=(null) inode=17251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=37 name=(null) inode=17254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=38 name=(null) inode=17251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=39 name=(null) inode=17255 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=40 name=(null) inode=17251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=41 name=(null) inode=17256 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=42 name=(null) inode=17236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=43 name=(null) inode=17257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=44 name=(null) inode=17257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=45 name=(null) inode=17258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=46 name=(null) inode=17257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=47 name=(null) inode=17259 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=48 name=(null) inode=17257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=49 name=(null) inode=17260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=50 name=(null) inode=17257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=51 name=(null) inode=17261 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=52 name=(null) inode=17257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=53 name=(null) inode=17262 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=55 name=(null) inode=17263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=56 name=(null) inode=17263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=57 name=(null) inode=17264 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=58 name=(null) inode=17263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=59 name=(null) inode=17265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=60 name=(null) inode=17263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=61 name=(null) inode=17266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=62 name=(null) inode=17266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=63 name=(null) inode=17267 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=64 name=(null) inode=17266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=65 name=(null) inode=17268 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=66 name=(null) inode=17266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=67 name=(null) inode=17269 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=68 name=(null) inode=17266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=69 name=(null) inode=17270 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=70 name=(null) inode=17266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=71 name=(null) inode=17271 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=72 name=(null) inode=17263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=73 name=(null) inode=17272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=74 name=(null) inode=17272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=75 name=(null) inode=17273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=76 name=(null) inode=17272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=77 name=(null) inode=17274 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=78 name=(null) inode=17272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=79 name=(null) inode=17275 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=80 name=(null) inode=17272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=81 name=(null) inode=17276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=82 name=(null) inode=17272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=83 name=(null) inode=17277 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=84 name=(null) inode=17263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=85 name=(null) inode=17278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=86 name=(null) inode=17278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=87 name=(null) inode=17279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=88 name=(null) inode=17278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=89 name=(null) inode=17280 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=90 name=(null) inode=17278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=91 name=(null) inode=17281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=92 name=(null) inode=17278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=93 name=(null) inode=17282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=94 name=(null) inode=17278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=95 name=(null) inode=17283 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=96 name=(null) inode=17263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=97 name=(null) inode=17284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=98 name=(null) inode=17284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=99 name=(null) inode=17285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=100 name=(null) inode=17284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=101 name=(null) inode=17286 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=102 name=(null) inode=17284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=103 name=(null) inode=17287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=104 name=(null) inode=17284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=105 name=(null) inode=17288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=106 name=(null) inode=17284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=107 name=(null) inode=17289 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PATH item=109 name=(null) inode=17290 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:50.080000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:19:50.090892 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Dec 13 14:19:50.091240 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Dec 13 14:19:50.091313 kernel: Guest personality initialized and is active Dec 13 14:19:50.093806 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Dec 13 14:19:50.093839 kernel: Initialized host personality Dec 13 14:19:50.100825 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:19:50.103445 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Dec 13 14:19:50.112467 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:19:50.120449 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:19:50.123826 (udev-worker)[1067]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Dec 13 14:19:50.139660 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:19:50.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.140611 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:19:50.168058 lvm[1087]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:19:50.192034 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:19:50.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.192228 systemd[1]: Reached target cryptsetup.target. Dec 13 14:19:50.193163 systemd[1]: Starting lvm2-activation.service... Dec 13 14:19:50.195766 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:19:50.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.212980 systemd[1]: Finished lvm2-activation.service. Dec 13 14:19:50.213162 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:19:50.213262 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:19:50.213275 systemd[1]: Reached target local-fs.target. Dec 13 14:19:50.213366 systemd[1]: Reached target machines.target. Dec 13 14:19:50.214310 systemd[1]: Starting ldconfig.service... Dec 13 14:19:50.225490 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:19:50.225524 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:19:50.226394 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:19:50.227109 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:19:50.228022 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:19:50.228843 systemd[1]: Starting systemd-sysext.service... Dec 13 14:19:50.252589 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1090 (bootctl) Dec 13 14:19:50.253546 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:19:50.268037 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:19:50.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.275240 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:19:50.286090 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:19:50.286193 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:19:50.339444 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:19:50.351314 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:19:50.351684 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:19:50.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.472445 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:19:50.492443 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:19:50.508546 systemd-fsck[1099]: fsck.fat 4.2 (2021-01-31) Dec 13 14:19:50.508546 systemd-fsck[1099]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:19:50.511143 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:19:50.515008 kernel: kauditd_printk_skb: 232 callbacks suppressed Dec 13 14:19:50.515062 kernel: audit: type=1130 audit(1734099590.509:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.512219 systemd[1]: Mounting boot.mount... Dec 13 14:19:50.517291 (sd-sysext)[1103]: Using extensions 'kubernetes'. Dec 13 14:19:50.517548 (sd-sysext)[1103]: Merged extensions into '/usr'. Dec 13 14:19:50.529333 systemd[1]: Mounted boot.mount. Dec 13 14:19:50.529707 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:19:50.530986 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:19:50.532390 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:19:50.534132 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:19:50.535558 systemd[1]: Starting modprobe@loop.service... Dec 13 14:19:50.535696 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:19:50.535800 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:19:50.535903 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:19:50.538334 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:19:50.538684 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:19:50.538758 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:19:50.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.539214 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:19:50.539286 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:19:50.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.544474 kernel: audit: type=1130 audit(1734099590.537:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.544515 kernel: audit: type=1131 audit(1734099590.537:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.544877 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:19:50.545084 systemd[1]: Finished modprobe@loop.service. Dec 13 14:19:50.548548 kernel: audit: type=1130 audit(1734099590.543:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.548605 kernel: audit: type=1131 audit(1734099590.543:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.551224 systemd[1]: Finished systemd-sysext.service. Dec 13 14:19:50.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.553717 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:19:50.555918 kernel: audit: type=1130 audit(1734099590.549:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.555945 kernel: audit: type=1131 audit(1734099590.549:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.559523 kernel: audit: type=1130 audit(1734099590.551:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.559565 kernel: audit: type=1130 audit(1734099590.554:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.557416 systemd[1]: Starting ensure-sysext.service... Dec 13 14:19:50.561565 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:19:50.561610 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:19:50.562938 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:19:50.565878 systemd[1]: Reloading. Dec 13 14:19:50.577227 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:19:50.582693 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:19:50.593585 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:19:50.613133 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-12-13T14:19:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:19:50.613328 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-12-13T14:19:50Z" level=info msg="torcx already run" Dec 13 14:19:50.673188 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:19:50.673306 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:19:50.685063 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:19:50.718000 audit: BPF prog-id=27 op=LOAD Dec 13 14:19:50.719000 audit: BPF prog-id=28 op=LOAD Dec 13 14:19:50.719000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:19:50.719000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:19:50.719000 audit: BPF prog-id=29 op=LOAD Dec 13 14:19:50.719000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:19:50.719000 audit: BPF prog-id=30 op=LOAD Dec 13 14:19:50.719000 audit: BPF prog-id=31 op=LOAD Dec 13 14:19:50.719000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:19:50.719000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:19:50.721446 kernel: audit: type=1334 audit(1734099590.718:164): prog-id=27 op=LOAD Dec 13 14:19:50.720000 audit: BPF prog-id=32 op=LOAD Dec 13 14:19:50.720000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:19:50.720000 audit: BPF prog-id=33 op=LOAD Dec 13 14:19:50.721000 audit: BPF prog-id=34 op=LOAD Dec 13 14:19:50.721000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:19:50.721000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:19:50.721000 audit: BPF prog-id=35 op=LOAD Dec 13 14:19:50.721000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:19:50.732036 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:19:50.733268 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:19:50.734084 systemd[1]: Starting modprobe@loop.service... Dec 13 14:19:50.734297 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:19:50.734364 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:19:50.735021 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:19:50.735098 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:19:50.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.735606 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:19:50.735723 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:19:50.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.736153 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:19:50.736268 systemd[1]: Finished modprobe@loop.service. Dec 13 14:19:50.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.737942 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:19:50.739203 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:19:50.740153 systemd[1]: Starting modprobe@loop.service... Dec 13 14:19:50.740380 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:19:50.740514 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:19:50.740926 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:19:50.741000 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:19:50.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.741512 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:19:50.741634 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:19:50.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.742133 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:19:50.742249 systemd[1]: Finished modprobe@loop.service. Dec 13 14:19:50.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.742749 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:19:50.742866 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:19:50.745068 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:19:50.746005 systemd[1]: Starting modprobe@drm.service... Dec 13 14:19:50.746831 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:19:50.747805 systemd[1]: Starting modprobe@loop.service... Dec 13 14:19:50.748076 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:19:50.748218 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:19:50.749111 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:19:50.750218 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:19:50.750351 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:19:50.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.750853 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:19:50.750970 systemd[1]: Finished modprobe@drm.service. Dec 13 14:19:50.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.751409 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:19:50.751544 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:19:50.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.751986 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:19:50.752101 systemd[1]: Finished modprobe@loop.service. Dec 13 14:19:50.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.752637 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:19:50.752765 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:19:50.753388 systemd[1]: Finished ensure-sysext.service. Dec 13 14:19:50.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.940973 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:19:50.942098 systemd[1]: Starting audit-rules.service... Dec 13 14:19:50.943019 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:19:50.944032 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:19:50.943000 audit: BPF prog-id=36 op=LOAD Dec 13 14:19:50.945268 systemd[1]: Starting systemd-resolved.service... Dec 13 14:19:50.944000 audit: BPF prog-id=37 op=LOAD Dec 13 14:19:50.946627 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:19:50.947752 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:19:50.951665 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:19:50.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.951920 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:19:50.958000 audit[1208]: SYSTEM_BOOT pid=1208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.960840 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:19:50.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:50.979921 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:19:50.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:51.002000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:19:51.002000 audit[1223]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe71efaae0 a2=420 a3=0 items=0 ppid=1203 pid=1223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:51.002000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:19:51.003678 augenrules[1223]: No rules Dec 13 14:19:51.003911 systemd[1]: Finished audit-rules.service. Dec 13 14:19:51.010367 systemd-resolved[1206]: Positive Trust Anchors: Dec 13 14:19:51.010376 systemd-resolved[1206]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:19:51.010394 systemd-resolved[1206]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:19:51.017672 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:19:51.017823 systemd[1]: Reached target time-set.target. Dec 13 14:19:51.035911 systemd-resolved[1206]: Defaulting to hostname 'linux'. Dec 13 14:19:51.037227 systemd[1]: Started systemd-resolved.service. Dec 13 14:19:51.037384 systemd[1]: Reached target network.target. Dec 13 14:19:51.037481 systemd[1]: Reached target nss-lookup.target. Dec 13 14:19:51.169991 ldconfig[1089]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:21:00.842616 systemd-resolved[1206]: Clock change detected. Flushing caches. Dec 13 14:21:00.844591 systemd-timesyncd[1207]: Contacted time server 45.56.66.53:123 (0.flatcar.pool.ntp.org). Dec 13 14:21:00.844862 systemd-timesyncd[1207]: Initial clock synchronization to Fri 2024-12-13 14:21:00.842538 UTC. Dec 13 14:21:00.857564 systemd[1]: Finished ldconfig.service. Dec 13 14:21:00.858880 systemd[1]: Starting systemd-update-done.service... Dec 13 14:21:00.870671 systemd[1]: Finished systemd-update-done.service. Dec 13 14:21:00.870894 systemd[1]: Reached target sysinit.target. Dec 13 14:21:00.871096 systemd[1]: Started motdgen.path. Dec 13 14:21:00.871240 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:21:00.871497 systemd[1]: Started logrotate.timer. Dec 13 14:21:00.871673 systemd[1]: Started mdadm.timer. Dec 13 14:21:00.871829 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:21:00.871955 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:21:00.871979 systemd[1]: Reached target paths.target. Dec 13 14:21:00.872142 systemd[1]: Reached target timers.target. Dec 13 14:21:00.872566 systemd[1]: Listening on dbus.socket. Dec 13 14:21:00.873712 systemd[1]: Starting docker.socket... Dec 13 14:21:00.885320 systemd[1]: Listening on sshd.socket. Dec 13 14:21:00.885724 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:21:00.886183 systemd[1]: Listening on docker.socket. Dec 13 14:21:00.886585 systemd[1]: Reached target sockets.target. Dec 13 14:21:00.886797 systemd[1]: Reached target basic.target. Dec 13 14:21:00.887020 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:21:00.887045 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:21:00.888144 systemd[1]: Starting containerd.service... Dec 13 14:21:00.889810 systemd[1]: Starting dbus.service... Dec 13 14:21:00.890747 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:21:00.891790 systemd[1]: Starting extend-filesystems.service... Dec 13 14:21:00.892522 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:21:00.893155 jq[1234]: false Dec 13 14:21:00.893454 systemd[1]: Starting motdgen.service... Dec 13 14:21:00.894459 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:21:00.895491 systemd[1]: Starting sshd-keygen.service... Dec 13 14:21:00.897344 systemd[1]: Starting systemd-logind.service... Dec 13 14:21:00.897463 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:21:00.897507 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:21:00.897914 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:21:00.898276 systemd[1]: Starting update-engine.service... Dec 13 14:21:00.900376 systemd-networkd[1059]: ens192: Gained IPv6LL Dec 13 14:21:00.902445 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:21:00.909958 jq[1243]: true Dec 13 14:21:00.904365 systemd[1]: Starting vmtoolsd.service... Dec 13 14:21:00.904968 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:21:00.906796 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:21:00.906895 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:21:00.907035 systemd[1]: Reached target network-online.target. Dec 13 14:21:00.909405 systemd[1]: Starting kubelet.service... Dec 13 14:21:00.909691 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:21:00.909790 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:21:00.916613 jq[1249]: true Dec 13 14:21:00.945549 systemd[1]: Started vmtoolsd.service. Dec 13 14:21:00.948367 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:21:00.948474 systemd[1]: Finished motdgen.service. Dec 13 14:21:00.950325 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:00.950340 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:00.959397 extend-filesystems[1235]: Found loop1 Dec 13 14:21:00.959397 extend-filesystems[1235]: Found sda Dec 13 14:21:00.960653 extend-filesystems[1235]: Found sda1 Dec 13 14:21:00.960653 extend-filesystems[1235]: Found sda2 Dec 13 14:21:00.960653 extend-filesystems[1235]: Found sda3 Dec 13 14:21:00.960653 extend-filesystems[1235]: Found usr Dec 13 14:21:00.960653 extend-filesystems[1235]: Found sda4 Dec 13 14:21:00.960653 extend-filesystems[1235]: Found sda6 Dec 13 14:21:00.960653 extend-filesystems[1235]: Found sda7 Dec 13 14:21:00.960653 extend-filesystems[1235]: Found sda9 Dec 13 14:21:00.960653 extend-filesystems[1235]: Checking size of /dev/sda9 Dec 13 14:21:00.992762 env[1271]: time="2024-12-13T14:21:00.992735774Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:21:01.000115 systemd-logind[1239]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:21:01.000129 systemd-logind[1239]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:21:01.000265 systemd-logind[1239]: New seat seat0. Dec 13 14:21:01.012297 extend-filesystems[1235]: Old size kept for /dev/sda9 Dec 13 14:21:01.012718 extend-filesystems[1235]: Found sr0 Dec 13 14:21:01.012995 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:21:01.013123 systemd[1]: Finished extend-filesystems.service. Dec 13 14:21:01.020325 bash[1269]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:21:01.020634 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:21:01.050061 dbus-daemon[1233]: [system] SELinux support is enabled Dec 13 14:21:01.052463 dbus-daemon[1233]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:21:01.050159 systemd[1]: Started dbus.service. Dec 13 14:21:01.051953 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:21:01.051973 systemd[1]: Reached target system-config.target. Dec 13 14:21:01.052151 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:21:01.052178 systemd[1]: Reached target user-config.target. Dec 13 14:21:01.052394 systemd[1]: Started systemd-logind.service. Dec 13 14:21:01.060980 env[1271]: time="2024-12-13T14:21:01.060953338Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:21:01.061183 env[1271]: time="2024-12-13T14:21:01.061168879Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:01.064409 env[1271]: time="2024-12-13T14:21:01.064383091Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:21:01.064409 env[1271]: time="2024-12-13T14:21:01.064406727Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:01.064565 env[1271]: time="2024-12-13T14:21:01.064540134Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:21:01.064782 env[1271]: time="2024-12-13T14:21:01.064771630Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:01.064831 env[1271]: time="2024-12-13T14:21:01.064819927Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:21:01.064907 env[1271]: time="2024-12-13T14:21:01.064868095Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:01.064997 env[1271]: time="2024-12-13T14:21:01.064985179Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:01.065198 env[1271]: time="2024-12-13T14:21:01.065188113Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:01.065334 env[1271]: time="2024-12-13T14:21:01.065321371Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:21:01.065386 env[1271]: time="2024-12-13T14:21:01.065376690Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:21:01.065454 env[1271]: time="2024-12-13T14:21:01.065444438Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:21:01.065501 env[1271]: time="2024-12-13T14:21:01.065491347Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:21:01.081295 kernel: NET: Registered PF_VSOCK protocol family Dec 13 14:21:01.092880 env[1271]: time="2024-12-13T14:21:01.092749574Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:21:01.092880 env[1271]: time="2024-12-13T14:21:01.092777239Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:21:01.092880 env[1271]: time="2024-12-13T14:21:01.092785681Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:21:01.092880 env[1271]: time="2024-12-13T14:21:01.092827262Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:21:01.092880 env[1271]: time="2024-12-13T14:21:01.092839679Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:21:01.092880 env[1271]: time="2024-12-13T14:21:01.092848754Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:21:01.092880 env[1271]: time="2024-12-13T14:21:01.092859806Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:21:01.092880 env[1271]: time="2024-12-13T14:21:01.092868853Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:21:01.093070 env[1271]: time="2024-12-13T14:21:01.092901618Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:21:01.093070 env[1271]: time="2024-12-13T14:21:01.092911812Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:21:01.093070 env[1271]: time="2024-12-13T14:21:01.092918623Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:21:01.093070 env[1271]: time="2024-12-13T14:21:01.092926360Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:21:01.093070 env[1271]: time="2024-12-13T14:21:01.093011973Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:21:01.093148 env[1271]: time="2024-12-13T14:21:01.093073709Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:21:01.093238 env[1271]: time="2024-12-13T14:21:01.093225865Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:21:01.093273 env[1271]: time="2024-12-13T14:21:01.093243545Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093273 env[1271]: time="2024-12-13T14:21:01.093251885Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:21:01.093325 env[1271]: time="2024-12-13T14:21:01.093298957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093325 env[1271]: time="2024-12-13T14:21:01.093309355Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093325 env[1271]: time="2024-12-13T14:21:01.093316390Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093325 env[1271]: time="2024-12-13T14:21:01.093322935Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093399 env[1271]: time="2024-12-13T14:21:01.093329728Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093399 env[1271]: time="2024-12-13T14:21:01.093336332Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093399 env[1271]: time="2024-12-13T14:21:01.093343047Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093399 env[1271]: time="2024-12-13T14:21:01.093360287Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093399 env[1271]: time="2024-12-13T14:21:01.093371315Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:21:01.093491 env[1271]: time="2024-12-13T14:21:01.093445472Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093491 env[1271]: time="2024-12-13T14:21:01.093454647Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093491 env[1271]: time="2024-12-13T14:21:01.093461868Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093491 env[1271]: time="2024-12-13T14:21:01.093467874Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:21:01.093491 env[1271]: time="2024-12-13T14:21:01.093476618Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:21:01.093491 env[1271]: time="2024-12-13T14:21:01.093482679Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:21:01.093599 env[1271]: time="2024-12-13T14:21:01.093493118Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:21:01.093599 env[1271]: time="2024-12-13T14:21:01.093525375Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:21:01.093686 env[1271]: time="2024-12-13T14:21:01.093647709Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.093689095Z" level=info msg="Connect containerd service" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.093710862Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094051845Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094205408Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094229828Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094265565Z" level=info msg="containerd successfully booted in 0.101958s" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094814622Z" level=info msg="Start subscribing containerd event" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094842027Z" level=info msg="Start recovering state" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094872160Z" level=info msg="Start event monitor" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094879230Z" level=info msg="Start snapshots syncer" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094883854Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:21:01.107751 env[1271]: time="2024-12-13T14:21:01.094888129Z" level=info msg="Start streaming server" Dec 13 14:21:01.094319 systemd[1]: Started containerd.service. Dec 13 14:21:01.121333 update_engine[1240]: I1213 14:21:01.117440 1240 main.cc:92] Flatcar Update Engine starting Dec 13 14:21:01.125019 systemd[1]: Started update-engine.service. Dec 13 14:21:01.127535 update_engine[1240]: I1213 14:21:01.125068 1240 update_check_scheduler.cc:74] Next update check in 6m6s Dec 13 14:21:01.126974 systemd[1]: Started locksmithd.service. Dec 13 14:21:01.279400 locksmithd[1294]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:21:01.577064 sshd_keygen[1252]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:21:01.589764 systemd[1]: Finished sshd-keygen.service. Dec 13 14:21:01.590910 systemd[1]: Starting issuegen.service... Dec 13 14:21:01.594357 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:21:01.594438 systemd[1]: Finished issuegen.service. Dec 13 14:21:01.595464 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:21:01.599776 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:21:01.600740 systemd[1]: Started getty@tty1.service. Dec 13 14:21:01.601546 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:21:01.601744 systemd[1]: Reached target getty.target. Dec 13 14:21:01.862289 systemd[1]: Started kubelet.service. Dec 13 14:21:01.862601 systemd[1]: Reached target multi-user.target. Dec 13 14:21:01.863499 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:21:01.867984 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:21:01.868070 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:21:01.868247 systemd[1]: Startup finished in 920ms (kernel) + 9.238s (initrd) + 6.422s (userspace) = 16.581s. Dec 13 14:21:01.931102 login[1358]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:21:01.931204 login[1357]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:21:01.940549 systemd[1]: Created slice user-500.slice. Dec 13 14:21:01.941421 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:21:01.944459 systemd-logind[1239]: New session 1 of user core. Dec 13 14:21:01.946753 systemd-logind[1239]: New session 2 of user core. Dec 13 14:21:01.949864 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:21:01.950958 systemd[1]: Starting user@500.service... Dec 13 14:21:01.953906 (systemd)[1364]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:02.017386 systemd[1364]: Queued start job for default target default.target. Dec 13 14:21:02.017890 systemd[1364]: Reached target paths.target. Dec 13 14:21:02.017962 systemd[1364]: Reached target sockets.target. Dec 13 14:21:02.018023 systemd[1364]: Reached target timers.target. Dec 13 14:21:02.018081 systemd[1364]: Reached target basic.target. Dec 13 14:21:02.018153 systemd[1364]: Reached target default.target. Dec 13 14:21:02.018195 systemd[1]: Started user@500.service. Dec 13 14:21:02.018295 systemd[1364]: Startup finished in 57ms. Dec 13 14:21:02.018976 systemd[1]: Started session-1.scope. Dec 13 14:21:02.019491 systemd[1]: Started session-2.scope. Dec 13 14:21:02.461904 kubelet[1361]: E1213 14:21:02.461872 1361 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:21:02.463015 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:21:02.463098 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:21:12.580319 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:21:12.580480 systemd[1]: Stopped kubelet.service. Dec 13 14:21:12.581696 systemd[1]: Starting kubelet.service... Dec 13 14:21:12.847984 systemd[1]: Started kubelet.service. Dec 13 14:21:12.916372 kubelet[1393]: E1213 14:21:12.916347 1393 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:21:12.919252 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:21:12.919370 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:21:23.080199 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:21:23.080340 systemd[1]: Stopped kubelet.service. Dec 13 14:21:23.081349 systemd[1]: Starting kubelet.service... Dec 13 14:21:23.504702 systemd[1]: Started kubelet.service. Dec 13 14:21:23.545748 kubelet[1405]: E1213 14:21:23.545717 1405 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:21:23.547261 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:21:23.547374 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:21:33.580211 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:21:33.580355 systemd[1]: Stopped kubelet.service. Dec 13 14:21:33.581349 systemd[1]: Starting kubelet.service... Dec 13 14:21:33.800617 systemd[1]: Started kubelet.service. Dec 13 14:21:33.851014 kubelet[1415]: E1213 14:21:33.850943 1415 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:21:33.852233 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:21:33.852361 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:21:41.248425 systemd[1]: Created slice system-sshd.slice. Dec 13 14:21:41.249374 systemd[1]: Started sshd@0-139.178.70.103:22-147.75.109.163:36962.service. Dec 13 14:21:41.294409 sshd[1422]: Accepted publickey for core from 147.75.109.163 port 36962 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:41.295289 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:41.298405 systemd[1]: Started session-3.scope. Dec 13 14:21:41.298979 systemd-logind[1239]: New session 3 of user core. Dec 13 14:21:41.346377 systemd[1]: Started sshd@1-139.178.70.103:22-147.75.109.163:36964.service. Dec 13 14:21:41.379517 sshd[1427]: Accepted publickey for core from 147.75.109.163 port 36964 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:41.380319 sshd[1427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:41.382843 systemd-logind[1239]: New session 4 of user core. Dec 13 14:21:41.383335 systemd[1]: Started session-4.scope. Dec 13 14:21:41.432146 sshd[1427]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:41.434325 systemd[1]: Started sshd@2-139.178.70.103:22-147.75.109.163:36974.service. Dec 13 14:21:41.435494 systemd-logind[1239]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:21:41.435610 systemd[1]: sshd@1-139.178.70.103:22-147.75.109.163:36964.service: Deactivated successfully. Dec 13 14:21:41.435947 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:21:41.437985 systemd-logind[1239]: Removed session 4. Dec 13 14:21:41.468522 sshd[1432]: Accepted publickey for core from 147.75.109.163 port 36974 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:41.469298 sshd[1432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:41.472229 systemd[1]: Started session-5.scope. Dec 13 14:21:41.473086 systemd-logind[1239]: New session 5 of user core. Dec 13 14:21:41.520811 sshd[1432]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:41.523680 systemd[1]: Started sshd@3-139.178.70.103:22-147.75.109.163:36990.service. Dec 13 14:21:41.524038 systemd[1]: sshd@2-139.178.70.103:22-147.75.109.163:36974.service: Deactivated successfully. Dec 13 14:21:41.524525 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:21:41.525315 systemd-logind[1239]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:21:41.526082 systemd-logind[1239]: Removed session 5. Dec 13 14:21:41.559226 sshd[1438]: Accepted publickey for core from 147.75.109.163 port 36990 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:41.560511 sshd[1438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:41.563809 systemd-logind[1239]: New session 6 of user core. Dec 13 14:21:41.564511 systemd[1]: Started session-6.scope. Dec 13 14:21:41.618375 sshd[1438]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:41.620215 systemd[1]: Started sshd@4-139.178.70.103:22-147.75.109.163:36998.service. Dec 13 14:21:41.620691 systemd[1]: sshd@3-139.178.70.103:22-147.75.109.163:36990.service: Deactivated successfully. Dec 13 14:21:41.621288 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:21:41.621959 systemd-logind[1239]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:21:41.623462 systemd-logind[1239]: Removed session 6. Dec 13 14:21:41.656467 sshd[1444]: Accepted publickey for core from 147.75.109.163 port 36998 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:41.657615 sshd[1444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:41.660989 systemd[1]: Started session-7.scope. Dec 13 14:21:41.662024 systemd-logind[1239]: New session 7 of user core. Dec 13 14:21:41.727798 sudo[1448]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:21:41.727957 sudo[1448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:21:41.735488 dbus-daemon[1233]: \xd0\xed\xc8\xf3\x98U: received setenforce notice (enforcing=1759171120) Dec 13 14:21:41.736702 sudo[1448]: pam_unix(sudo:session): session closed for user root Dec 13 14:21:41.740446 sshd[1444]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:41.742062 systemd[1]: Started sshd@5-139.178.70.103:22-147.75.109.163:37000.service. Dec 13 14:21:41.743797 systemd[1]: sshd@4-139.178.70.103:22-147.75.109.163:36998.service: Deactivated successfully. Dec 13 14:21:41.744232 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:21:41.745115 systemd-logind[1239]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:21:41.746000 systemd-logind[1239]: Removed session 7. Dec 13 14:21:41.777450 sshd[1451]: Accepted publickey for core from 147.75.109.163 port 37000 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:41.777338 sshd[1451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:41.780917 systemd[1]: Started session-8.scope. Dec 13 14:21:41.781816 systemd-logind[1239]: New session 8 of user core. Dec 13 14:21:41.831272 sudo[1456]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:21:41.831413 sudo[1456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:21:41.833066 sudo[1456]: pam_unix(sudo:session): session closed for user root Dec 13 14:21:41.835957 sudo[1455]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:21:41.836220 sudo[1455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:21:41.841949 systemd[1]: Stopping audit-rules.service... Dec 13 14:21:41.841000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:21:41.843768 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 14:21:41.843799 kernel: audit: type=1305 audit(1734099701.841:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:21:41.841000 audit[1459]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdfad90390 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:41.848973 kernel: audit: type=1300 audit(1734099701.841:211): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdfad90390 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:41.849001 kernel: audit: type=1327 audit(1734099701.841:211): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:21:41.841000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:21:41.850098 auditctl[1459]: No rules Dec 13 14:21:41.850274 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:21:41.850386 systemd[1]: Stopped audit-rules.service. Dec 13 14:21:41.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.851457 systemd[1]: Starting audit-rules.service... Dec 13 14:21:41.854297 kernel: audit: type=1131 audit(1734099701.849:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.864189 augenrules[1476]: No rules Dec 13 14:21:41.864663 systemd[1]: Finished audit-rules.service. Dec 13 14:21:41.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.863000 audit[1455]: USER_END pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.868085 systemd[1]: Started sshd@6-139.178.70.103:22-147.75.109.163:37014.service. Dec 13 14:21:41.865075 sudo[1455]: pam_unix(sudo:session): session closed for user root Dec 13 14:21:41.870831 kernel: audit: type=1130 audit(1734099701.863:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.870863 kernel: audit: type=1106 audit(1734099701.863:214): pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.870938 sshd[1451]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:41.863000 audit[1455]: CRED_DISP pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.873638 kernel: audit: type=1104 audit(1734099701.863:215): pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-147.75.109.163:37014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.876702 kernel: audit: type=1130 audit(1734099701.867:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-147.75.109.163:37014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.879196 systemd[1]: sshd@5-139.178.70.103:22-147.75.109.163:37000.service: Deactivated successfully. Dec 13 14:21:41.879607 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:21:41.880331 systemd-logind[1239]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:21:41.877000 audit[1451]: USER_END pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:41.880851 systemd-logind[1239]: Removed session 8. Dec 13 14:21:41.877000 audit[1451]: CRED_DISP pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:41.887493 kernel: audit: type=1106 audit(1734099701.877:217): pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:41.887553 kernel: audit: type=1104 audit(1734099701.877:218): pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:41.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.103:22-147.75.109.163:37000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.907000 audit[1481]: USER_ACCT pid=1481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:41.909307 sshd[1481]: Accepted publickey for core from 147.75.109.163 port 37014 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:41.908000 audit[1481]: CRED_ACQ pid=1481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:41.908000 audit[1481]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe951855b0 a2=3 a3=0 items=0 ppid=1 pid=1481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:41.908000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:21:41.909969 sshd[1481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:41.912953 systemd[1]: Started session-9.scope. Dec 13 14:21:41.913785 systemd-logind[1239]: New session 9 of user core. Dec 13 14:21:41.915000 audit[1481]: USER_START pid=1481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:41.916000 audit[1484]: CRED_ACQ pid=1484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:41.962392 sudo[1485]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:21:41.962528 sudo[1485]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:21:41.961000 audit[1485]: USER_ACCT pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.961000 audit[1485]: CRED_REFR pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.962000 audit[1485]: USER_START pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.968245 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Dec 13 14:21:41.969834 systemd[1]: Starting coreos-metadata.service... Dec 13 14:21:41.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.982343 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 14:21:41.982440 systemd[1]: Finished coreos-metadata.service. Dec 13 14:21:42.542368 systemd[1]: Stopped kubelet.service. Dec 13 14:21:42.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:42.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:42.544428 systemd[1]: Starting kubelet.service... Dec 13 14:21:42.561163 systemd[1]: Reloading. Dec 13 14:21:42.635151 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2024-12-13T14:21:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:21:42.635371 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2024-12-13T14:21:42Z" level=info msg="torcx already run" Dec 13 14:21:42.700855 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:21:42.700869 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:21:42.713792 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.757000 audit: BPF prog-id=43 op=LOAD Dec 13 14:21:42.757000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:21:42.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit: BPF prog-id=44 op=LOAD Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit: BPF prog-id=45 op=LOAD Dec 13 14:21:42.758000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:21:42.758000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit: BPF prog-id=46 op=LOAD Dec 13 14:21:42.758000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit: BPF prog-id=47 op=LOAD Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit: BPF prog-id=48 op=LOAD Dec 13 14:21:42.758000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:21:42.758000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.758000 audit: BPF prog-id=49 op=LOAD Dec 13 14:21:42.758000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.759000 audit: BPF prog-id=50 op=LOAD Dec 13 14:21:42.759000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit: BPF prog-id=51 op=LOAD Dec 13 14:21:42.760000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit: BPF prog-id=52 op=LOAD Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.760000 audit: BPF prog-id=53 op=LOAD Dec 13 14:21:42.760000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:21:42.760000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit: BPF prog-id=54 op=LOAD Dec 13 14:21:42.761000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit: BPF prog-id=55 op=LOAD Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.761000 audit: BPF prog-id=56 op=LOAD Dec 13 14:21:42.761000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:21:42.761000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:42.762000 audit: BPF prog-id=57 op=LOAD Dec 13 14:21:42.762000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:21:42.776269 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:21:42.776330 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:21:42.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:21:42.776459 systemd[1]: Stopped kubelet.service. Dec 13 14:21:42.777866 systemd[1]: Starting kubelet.service... Dec 13 14:21:43.037766 systemd[1]: Started kubelet.service. Dec 13 14:21:43.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.063983 kubelet[1617]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:21:43.064195 kubelet[1617]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:21:43.064249 kubelet[1617]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:21:43.069073 kubelet[1617]: I1213 14:21:43.069042 1617 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:21:43.421010 kubelet[1617]: I1213 14:21:43.420987 1617 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:21:43.421010 kubelet[1617]: I1213 14:21:43.421005 1617 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:21:43.421154 kubelet[1617]: I1213 14:21:43.421141 1617 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:21:43.430999 kubelet[1617]: I1213 14:21:43.430987 1617 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:21:43.440468 kubelet[1617]: I1213 14:21:43.440449 1617 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:21:43.444426 kubelet[1617]: I1213 14:21:43.444403 1617 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:21:43.444670 kubelet[1617]: I1213 14:21:43.444496 1617 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.135","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:21:43.444772 kubelet[1617]: I1213 14:21:43.444763 1617 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:21:43.444814 kubelet[1617]: I1213 14:21:43.444807 1617 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:21:43.444968 kubelet[1617]: I1213 14:21:43.444961 1617 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:21:43.445797 kubelet[1617]: I1213 14:21:43.445788 1617 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:21:43.445982 kubelet[1617]: I1213 14:21:43.445970 1617 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:21:43.446013 kubelet[1617]: I1213 14:21:43.445990 1617 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:21:43.446013 kubelet[1617]: I1213 14:21:43.445998 1617 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:21:43.446189 kubelet[1617]: E1213 14:21:43.446179 1617 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:43.446263 kubelet[1617]: E1213 14:21:43.446252 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:43.449818 kubelet[1617]: I1213 14:21:43.449807 1617 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:21:43.451082 kubelet[1617]: I1213 14:21:43.451072 1617 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:21:43.451396 kubelet[1617]: W1213 14:21:43.451243 1617 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.67.124.135" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:21:43.451456 kubelet[1617]: E1213 14:21:43.451449 1617 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.124.135" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:21:43.451503 kubelet[1617]: W1213 14:21:43.451315 1617 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:21:43.451554 kubelet[1617]: E1213 14:21:43.451546 1617 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:21:43.451596 kubelet[1617]: W1213 14:21:43.451388 1617 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:21:43.452225 kubelet[1617]: I1213 14:21:43.452217 1617 server.go:1264] "Started kubelet" Dec 13 14:21:43.460000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:43.460000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:21:43.460000 audit[1617]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a659b0 a1=c000911788 a2=c000a65980 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.461564 kubelet[1617]: I1213 14:21:43.461540 1617 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:21:43.461633 kubelet[1617]: I1213 14:21:43.461622 1617 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:21:43.461710 kubelet[1617]: I1213 14:21:43.461703 1617 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:21:43.460000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:21:43.460000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:43.460000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:21:43.460000 audit[1617]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000b09a0 a1=c0009117a0 a2=c000a65a40 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.460000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:21:43.465537 kubelet[1617]: I1213 14:21:43.465501 1617 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:21:43.466223 kubelet[1617]: I1213 14:21:43.466212 1617 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:21:43.466717 kubelet[1617]: I1213 14:21:43.466690 1617 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:21:43.466815 kubelet[1617]: I1213 14:21:43.466804 1617 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:21:43.467473 kubelet[1617]: E1213 14:21:43.467403 1617 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1810c27e1d60f284 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2024-12-13 14:21:43.452201604 +0000 UTC m=+0.410542138,LastTimestamp:2024-12-13 14:21:43.452201604 +0000 UTC m=+0.410542138,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Dec 13 14:21:43.467746 kubelet[1617]: I1213 14:21:43.467589 1617 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:21:43.467746 kubelet[1617]: I1213 14:21:43.467634 1617 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:21:43.467746 kubelet[1617]: I1213 14:21:43.467674 1617 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:21:43.468318 kubelet[1617]: E1213 14:21:43.468306 1617 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:21:43.468603 kubelet[1617]: I1213 14:21:43.468591 1617 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:21:43.468651 kubelet[1617]: I1213 14:21:43.468638 1617 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:21:43.469102 kubelet[1617]: I1213 14:21:43.469093 1617 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:21:43.478233 kubelet[1617]: I1213 14:21:43.478214 1617 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:21:43.478233 kubelet[1617]: I1213 14:21:43.478226 1617 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:21:43.478233 kubelet[1617]: I1213 14:21:43.478236 1617 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:21:43.478766 kubelet[1617]: W1213 14:21:43.478756 1617 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:21:43.478824 kubelet[1617]: E1213 14:21:43.478815 1617 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:21:43.478919 kubelet[1617]: E1213 14:21:43.478909 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.135\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:21:43.479054 kubelet[1617]: E1213 14:21:43.479012 1617 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.135.1810c27e1e569626 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.135,UID:10.67.124.135,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.124.135,},FirstTimestamp:2024-12-13 14:21:43.468299814 +0000 UTC m=+0.426640348,LastTimestamp:2024-12-13 14:21:43.468299814 +0000 UTC m=+0.426640348,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.135,}" Dec 13 14:21:43.480445 kubelet[1617]: I1213 14:21:43.480431 1617 policy_none.go:49] "None policy: Start" Dec 13 14:21:43.480766 kubelet[1617]: I1213 14:21:43.480747 1617 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:21:43.480766 kubelet[1617]: I1213 14:21:43.480768 1617 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:21:43.484400 systemd[1]: Created slice kubepods.slice. Dec 13 14:21:43.490532 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:21:43.492712 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:21:43.496923 kubelet[1617]: I1213 14:21:43.496909 1617 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:21:43.495000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:43.495000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:21:43.495000 audit[1617]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000eaaba0 a1=c000ee4978 a2=c000eaab70 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.495000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:21:43.497213 kubelet[1617]: I1213 14:21:43.497203 1617 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:21:43.497356 kubelet[1617]: I1213 14:21:43.497334 1617 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:21:43.497468 kubelet[1617]: I1213 14:21:43.497461 1617 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:21:43.499972 kubelet[1617]: E1213 14:21:43.499962 1617 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.135\" not found" Dec 13 14:21:43.500000 audit[1631]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:43.500000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1660bef0 a2=0 a3=7ffd1660bedc items=0 ppid=1617 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.500000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:21:43.501000 audit[1634]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:43.501000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd5c55eb10 a2=0 a3=7ffd5c55eafc items=0 ppid=1617 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:21:43.502000 audit[1636]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:43.502000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd1cd329d0 a2=0 a3=7ffd1cd329bc items=0 ppid=1617 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:21:43.515000 audit[1641]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:43.515000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcab9fee20 a2=0 a3=7ffcab9fee0c items=0 ppid=1617 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:21:43.549000 audit[1646]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:43.549000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff46487ba0 a2=0 a3=7fff46487b8c items=0 ppid=1617 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:21:43.551554 kubelet[1617]: I1213 14:21:43.551532 1617 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:21:43.550000 audit[1647]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:43.550000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc91d5c30 a2=0 a3=7fffc91d5c1c items=0 ppid=1617 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:21:43.552256 kubelet[1617]: I1213 14:21:43.552247 1617 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:21:43.552325 kubelet[1617]: I1213 14:21:43.552319 1617 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:21:43.552451 kubelet[1617]: I1213 14:21:43.552445 1617 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:21:43.552527 kubelet[1617]: E1213 14:21:43.552518 1617 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:21:43.551000 audit[1649]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:43.551000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4c72c6e0 a2=0 a3=7fff4c72c6cc items=0 ppid=1617 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:21:43.552000 audit[1648]: NETFILTER_CFG table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:43.552000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2963eb10 a2=0 a3=7ffc2963eafc items=0 ppid=1617 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:21:43.552000 audit[1650]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:43.552000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe6fa6dc60 a2=0 a3=7ffe6fa6dc4c items=0 ppid=1617 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:21:43.553000 audit[1651]: NETFILTER_CFG table=filter:11 family=10 entries=2 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:43.553000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdb94d73d0 a2=0 a3=7ffdb94d73bc items=0 ppid=1617 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:21:43.553000 audit[1652]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:43.553000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd83a58190 a2=0 a3=7ffd83a5817c items=0 ppid=1617 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:21:43.554000 audit[1653]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:43.554000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeecc98140 a2=0 a3=7ffeecc9812c items=0 ppid=1617 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:43.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:21:43.568084 kubelet[1617]: I1213 14:21:43.568064 1617 kubelet_node_status.go:73] "Attempting to register node" node="10.67.124.135" Dec 13 14:21:43.571451 kubelet[1617]: I1213 14:21:43.571430 1617 kubelet_node_status.go:76] "Successfully registered node" node="10.67.124.135" Dec 13 14:21:43.578975 kubelet[1617]: E1213 14:21:43.578951 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:43.680112 kubelet[1617]: E1213 14:21:43.680022 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:43.780390 kubelet[1617]: E1213 14:21:43.780361 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:43.880973 kubelet[1617]: E1213 14:21:43.880941 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:43.982024 kubelet[1617]: E1213 14:21:43.981864 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:44.051997 sudo[1485]: pam_unix(sudo:session): session closed for user root Dec 13 14:21:44.051000 audit[1485]: USER_END pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.051000 audit[1485]: CRED_DISP pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.053257 sshd[1481]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:44.052000 audit[1481]: USER_END pid=1481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:44.053000 audit[1481]: CRED_DISP pid=1481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:44.055203 systemd-logind[1239]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:21:44.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-147.75.109.163:37014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.056227 systemd[1]: sshd@6-139.178.70.103:22-147.75.109.163:37014.service: Deactivated successfully. Dec 13 14:21:44.056804 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:21:44.057980 systemd-logind[1239]: Removed session 9. Dec 13 14:21:44.082305 kubelet[1617]: E1213 14:21:44.082283 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:44.182840 kubelet[1617]: E1213 14:21:44.182806 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:44.283340 kubelet[1617]: E1213 14:21:44.283252 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:44.383795 kubelet[1617]: E1213 14:21:44.383765 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:44.422973 kubelet[1617]: I1213 14:21:44.422941 1617 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:21:44.423364 kubelet[1617]: W1213 14:21:44.423350 1617 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:21:44.447232 kubelet[1617]: E1213 14:21:44.447201 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:44.484132 kubelet[1617]: E1213 14:21:44.484090 1617 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.135\" not found" Dec 13 14:21:44.584515 kubelet[1617]: I1213 14:21:44.584495 1617 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:21:44.584713 env[1271]: time="2024-12-13T14:21:44.584689088Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:21:44.584905 kubelet[1617]: I1213 14:21:44.584784 1617 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:21:45.447518 kubelet[1617]: E1213 14:21:45.447470 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:45.447518 kubelet[1617]: I1213 14:21:45.447519 1617 apiserver.go:52] "Watching apiserver" Dec 13 14:21:45.451237 kubelet[1617]: I1213 14:21:45.451211 1617 topology_manager.go:215] "Topology Admit Handler" podUID="c4f9c10e-6f1f-442d-bd4c-9de941b83956" podNamespace="calico-system" podName="calico-node-6dhcq" Dec 13 14:21:45.451425 kubelet[1617]: I1213 14:21:45.451412 1617 topology_manager.go:215] "Topology Admit Handler" podUID="b71981e5-2664-4520-a27c-9d81d3e2f763" podNamespace="calico-system" podName="csi-node-driver-qk6p4" Dec 13 14:21:45.451557 kubelet[1617]: I1213 14:21:45.451547 1617 topology_manager.go:215] "Topology Admit Handler" podUID="6b56cf1d-5086-4445-b5e0-cea556afa1c5" podNamespace="kube-system" podName="kube-proxy-twn5n" Dec 13 14:21:45.451994 kubelet[1617]: E1213 14:21:45.451976 1617 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qk6p4" podUID="b71981e5-2664-4520-a27c-9d81d3e2f763" Dec 13 14:21:45.455421 systemd[1]: Created slice kubepods-besteffort-podc4f9c10e_6f1f_442d_bd4c_9de941b83956.slice. Dec 13 14:21:45.467904 kubelet[1617]: I1213 14:21:45.467887 1617 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:21:45.469598 systemd[1]: Created slice kubepods-besteffort-pod6b56cf1d_5086_4445_b5e0_cea556afa1c5.slice. Dec 13 14:21:45.477551 kubelet[1617]: I1213 14:21:45.477522 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b71981e5-2664-4520-a27c-9d81d3e2f763-varrun\") pod \"csi-node-driver-qk6p4\" (UID: \"b71981e5-2664-4520-a27c-9d81d3e2f763\") " pod="calico-system/csi-node-driver-qk6p4" Dec 13 14:21:45.477695 kubelet[1617]: I1213 14:21:45.477683 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b71981e5-2664-4520-a27c-9d81d3e2f763-socket-dir\") pod \"csi-node-driver-qk6p4\" (UID: \"b71981e5-2664-4520-a27c-9d81d3e2f763\") " pod="calico-system/csi-node-driver-qk6p4" Dec 13 14:21:45.477789 kubelet[1617]: I1213 14:21:45.477780 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6b56cf1d-5086-4445-b5e0-cea556afa1c5-lib-modules\") pod \"kube-proxy-twn5n\" (UID: \"6b56cf1d-5086-4445-b5e0-cea556afa1c5\") " pod="kube-system/kube-proxy-twn5n" Dec 13 14:21:45.477857 kubelet[1617]: I1213 14:21:45.477847 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c4f9c10e-6f1f-442d-bd4c-9de941b83956-flexvol-driver-host\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.477916 kubelet[1617]: I1213 14:21:45.477907 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c4f9c10e-6f1f-442d-bd4c-9de941b83956-var-lib-calico\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.477976 kubelet[1617]: I1213 14:21:45.477967 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tvhvq\" (UniqueName: \"kubernetes.io/projected/c4f9c10e-6f1f-442d-bd4c-9de941b83956-kube-api-access-tvhvq\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.478032 kubelet[1617]: I1213 14:21:45.478023 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cznsk\" (UniqueName: \"kubernetes.io/projected/b71981e5-2664-4520-a27c-9d81d3e2f763-kube-api-access-cznsk\") pod \"csi-node-driver-qk6p4\" (UID: \"b71981e5-2664-4520-a27c-9d81d3e2f763\") " pod="calico-system/csi-node-driver-qk6p4" Dec 13 14:21:45.478172 kubelet[1617]: I1213 14:21:45.478141 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6b56cf1d-5086-4445-b5e0-cea556afa1c5-xtables-lock\") pod \"kube-proxy-twn5n\" (UID: \"6b56cf1d-5086-4445-b5e0-cea556afa1c5\") " pod="kube-system/kube-proxy-twn5n" Dec 13 14:21:45.478236 kubelet[1617]: I1213 14:21:45.478227 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c4f9c10e-6f1f-442d-bd4c-9de941b83956-var-run-calico\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.478315 kubelet[1617]: I1213 14:21:45.478306 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c4f9c10e-6f1f-442d-bd4c-9de941b83956-policysync\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.478392 kubelet[1617]: I1213 14:21:45.478378 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c4f9c10e-6f1f-442d-bd4c-9de941b83956-tigera-ca-bundle\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.478447 kubelet[1617]: I1213 14:21:45.478438 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c4f9c10e-6f1f-442d-bd4c-9de941b83956-cni-net-dir\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.478501 kubelet[1617]: I1213 14:21:45.478492 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c4f9c10e-6f1f-442d-bd4c-9de941b83956-cni-log-dir\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.478572 kubelet[1617]: I1213 14:21:45.478554 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b71981e5-2664-4520-a27c-9d81d3e2f763-registration-dir\") pod \"csi-node-driver-qk6p4\" (UID: \"b71981e5-2664-4520-a27c-9d81d3e2f763\") " pod="calico-system/csi-node-driver-qk6p4" Dec 13 14:21:45.478646 kubelet[1617]: I1213 14:21:45.478637 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6b56cf1d-5086-4445-b5e0-cea556afa1c5-kube-proxy\") pod \"kube-proxy-twn5n\" (UID: \"6b56cf1d-5086-4445-b5e0-cea556afa1c5\") " pod="kube-system/kube-proxy-twn5n" Dec 13 14:21:45.478711 kubelet[1617]: I1213 14:21:45.478696 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p254v\" (UniqueName: \"kubernetes.io/projected/6b56cf1d-5086-4445-b5e0-cea556afa1c5-kube-api-access-p254v\") pod \"kube-proxy-twn5n\" (UID: \"6b56cf1d-5086-4445-b5e0-cea556afa1c5\") " pod="kube-system/kube-proxy-twn5n" Dec 13 14:21:45.478744 kubelet[1617]: I1213 14:21:45.478714 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c4f9c10e-6f1f-442d-bd4c-9de941b83956-xtables-lock\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.478744 kubelet[1617]: I1213 14:21:45.478737 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c4f9c10e-6f1f-442d-bd4c-9de941b83956-node-certs\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.478785 kubelet[1617]: I1213 14:21:45.478748 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c4f9c10e-6f1f-442d-bd4c-9de941b83956-cni-bin-dir\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.478785 kubelet[1617]: I1213 14:21:45.478761 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b71981e5-2664-4520-a27c-9d81d3e2f763-kubelet-dir\") pod \"csi-node-driver-qk6p4\" (UID: \"b71981e5-2664-4520-a27c-9d81d3e2f763\") " pod="calico-system/csi-node-driver-qk6p4" Dec 13 14:21:45.478785 kubelet[1617]: I1213 14:21:45.478770 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c4f9c10e-6f1f-442d-bd4c-9de941b83956-lib-modules\") pod \"calico-node-6dhcq\" (UID: \"c4f9c10e-6f1f-442d-bd4c-9de941b83956\") " pod="calico-system/calico-node-6dhcq" Dec 13 14:21:45.580684 kubelet[1617]: E1213 14:21:45.580661 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.580795 kubelet[1617]: W1213 14:21:45.580779 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.580850 kubelet[1617]: E1213 14:21:45.580840 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.580970 kubelet[1617]: E1213 14:21:45.580963 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.581016 kubelet[1617]: W1213 14:21:45.581007 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.581063 kubelet[1617]: E1213 14:21:45.581055 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.581177 kubelet[1617]: E1213 14:21:45.581171 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.581221 kubelet[1617]: W1213 14:21:45.581213 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.581265 kubelet[1617]: E1213 14:21:45.581256 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.581659 kubelet[1617]: E1213 14:21:45.581653 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.581727 kubelet[1617]: W1213 14:21:45.581719 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.583656 kubelet[1617]: E1213 14:21:45.583642 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.584134 kubelet[1617]: E1213 14:21:45.584124 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.584195 kubelet[1617]: W1213 14:21:45.584184 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.584247 kubelet[1617]: E1213 14:21:45.584238 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.584408 kubelet[1617]: E1213 14:21:45.584402 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.584453 kubelet[1617]: W1213 14:21:45.584444 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.584503 kubelet[1617]: E1213 14:21:45.584495 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.584619 kubelet[1617]: E1213 14:21:45.584608 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.584619 kubelet[1617]: W1213 14:21:45.584616 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.584722 kubelet[1617]: E1213 14:21:45.584629 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.584722 kubelet[1617]: E1213 14:21:45.584715 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.584722 kubelet[1617]: W1213 14:21:45.584719 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.584778 kubelet[1617]: E1213 14:21:45.584725 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.584799 kubelet[1617]: E1213 14:21:45.584792 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.584799 kubelet[1617]: W1213 14:21:45.584796 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.584839 kubelet[1617]: E1213 14:21:45.584801 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.584893 kubelet[1617]: E1213 14:21:45.584880 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.584893 kubelet[1617]: W1213 14:21:45.584889 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.584893 kubelet[1617]: E1213 14:21:45.584894 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.585059 kubelet[1617]: E1213 14:21:45.585052 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.585107 kubelet[1617]: W1213 14:21:45.585098 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.585156 kubelet[1617]: E1213 14:21:45.585149 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.585297 kubelet[1617]: E1213 14:21:45.585284 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.585346 kubelet[1617]: W1213 14:21:45.585338 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.585403 kubelet[1617]: E1213 14:21:45.585395 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.585485 kubelet[1617]: E1213 14:21:45.585475 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.585485 kubelet[1617]: W1213 14:21:45.585483 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.585547 kubelet[1617]: E1213 14:21:45.585491 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.585632 kubelet[1617]: E1213 14:21:45.585615 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.585632 kubelet[1617]: W1213 14:21:45.585625 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.585632 kubelet[1617]: E1213 14:21:45.585632 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.585729 kubelet[1617]: E1213 14:21:45.585720 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.585729 kubelet[1617]: W1213 14:21:45.585727 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.585806 kubelet[1617]: E1213 14:21:45.585797 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.585806 kubelet[1617]: W1213 14:21:45.585804 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.585864 kubelet[1617]: E1213 14:21:45.585797 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.585917 kubelet[1617]: E1213 14:21:45.585867 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.585917 kubelet[1617]: W1213 14:21:45.585916 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.585983 kubelet[1617]: E1213 14:21:45.585870 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.586033 kubelet[1617]: E1213 14:21:45.585983 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.586082 kubelet[1617]: W1213 14:21:45.586074 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.586144 kubelet[1617]: E1213 14:21:45.585986 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.586176 kubelet[1617]: E1213 14:21:45.586147 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.586313 kubelet[1617]: E1213 14:21:45.586272 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.586363 kubelet[1617]: W1213 14:21:45.586355 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.586428 kubelet[1617]: E1213 14:21:45.586417 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.586542 kubelet[1617]: E1213 14:21:45.586536 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.586590 kubelet[1617]: W1213 14:21:45.586582 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.586652 kubelet[1617]: E1213 14:21:45.586642 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.586773 kubelet[1617]: E1213 14:21:45.586767 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.586819 kubelet[1617]: W1213 14:21:45.586811 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.586877 kubelet[1617]: E1213 14:21:45.586866 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.587020 kubelet[1617]: E1213 14:21:45.587013 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.587066 kubelet[1617]: W1213 14:21:45.587058 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.587119 kubelet[1617]: E1213 14:21:45.587112 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.587253 kubelet[1617]: E1213 14:21:45.587247 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.587304 kubelet[1617]: W1213 14:21:45.587296 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.587362 kubelet[1617]: E1213 14:21:45.587353 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.587466 kubelet[1617]: E1213 14:21:45.587445 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.587466 kubelet[1617]: W1213 14:21:45.587452 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.587466 kubelet[1617]: E1213 14:21:45.587459 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.587577 kubelet[1617]: E1213 14:21:45.587563 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.587577 kubelet[1617]: W1213 14:21:45.587574 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.587651 kubelet[1617]: E1213 14:21:45.587580 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.587680 kubelet[1617]: E1213 14:21:45.587674 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.587680 kubelet[1617]: W1213 14:21:45.587678 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.587718 kubelet[1617]: E1213 14:21:45.587683 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.587863 kubelet[1617]: E1213 14:21:45.587855 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.587915 kubelet[1617]: W1213 14:21:45.587904 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.587981 kubelet[1617]: E1213 14:21:45.587970 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.588123 kubelet[1617]: E1213 14:21:45.588117 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.588172 kubelet[1617]: W1213 14:21:45.588163 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.588227 kubelet[1617]: E1213 14:21:45.588218 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.588401 kubelet[1617]: E1213 14:21:45.588395 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.588453 kubelet[1617]: W1213 14:21:45.588445 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.588513 kubelet[1617]: E1213 14:21:45.588500 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.588629 kubelet[1617]: E1213 14:21:45.588623 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.588678 kubelet[1617]: W1213 14:21:45.588670 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.588744 kubelet[1617]: E1213 14:21:45.588733 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.588879 kubelet[1617]: E1213 14:21:45.588870 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.589064 kubelet[1617]: W1213 14:21:45.589055 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.589129 kubelet[1617]: E1213 14:21:45.589118 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.589251 kubelet[1617]: E1213 14:21:45.589244 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.589351 kubelet[1617]: W1213 14:21:45.589342 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.589408 kubelet[1617]: E1213 14:21:45.589397 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.589534 kubelet[1617]: E1213 14:21:45.589528 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.589581 kubelet[1617]: W1213 14:21:45.589573 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.589642 kubelet[1617]: E1213 14:21:45.589629 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.589756 kubelet[1617]: E1213 14:21:45.589750 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.589810 kubelet[1617]: W1213 14:21:45.589801 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.589883 kubelet[1617]: E1213 14:21:45.589871 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.590051 kubelet[1617]: E1213 14:21:45.590044 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.590100 kubelet[1617]: W1213 14:21:45.590091 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.590241 kubelet[1617]: E1213 14:21:45.590235 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.590315 kubelet[1617]: W1213 14:21:45.590307 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.590419 kubelet[1617]: E1213 14:21:45.590334 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.590623 kubelet[1617]: E1213 14:21:45.590611 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.590721 kubelet[1617]: E1213 14:21:45.590689 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.590777 kubelet[1617]: W1213 14:21:45.590766 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.590827 kubelet[1617]: E1213 14:21:45.590819 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.590972 kubelet[1617]: E1213 14:21:45.590966 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.591021 kubelet[1617]: W1213 14:21:45.591013 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.591071 kubelet[1617]: E1213 14:21:45.591063 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.591198 kubelet[1617]: E1213 14:21:45.591192 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.591245 kubelet[1617]: W1213 14:21:45.591237 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.591315 kubelet[1617]: E1213 14:21:45.591302 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.598872 kubelet[1617]: E1213 14:21:45.598858 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.598967 kubelet[1617]: W1213 14:21:45.598956 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.599030 kubelet[1617]: E1213 14:21:45.599022 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.599557 kubelet[1617]: E1213 14:21:45.599545 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.599557 kubelet[1617]: W1213 14:21:45.599554 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.599618 kubelet[1617]: E1213 14:21:45.599563 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.603520 kubelet[1617]: E1213 14:21:45.603504 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:45.603520 kubelet[1617]: W1213 14:21:45.603514 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:45.603632 kubelet[1617]: E1213 14:21:45.603524 1617 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:45.769995 env[1271]: time="2024-12-13T14:21:45.767346153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6dhcq,Uid:c4f9c10e-6f1f-442d-bd4c-9de941b83956,Namespace:calico-system,Attempt:0,}" Dec 13 14:21:45.772827 env[1271]: time="2024-12-13T14:21:45.772810049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-twn5n,Uid:6b56cf1d-5086-4445-b5e0-cea556afa1c5,Namespace:kube-system,Attempt:0,}" Dec 13 14:21:46.289382 update_engine[1240]: I1213 14:21:46.289345 1240 update_attempter.cc:509] Updating boot flags... Dec 13 14:21:46.373374 env[1271]: time="2024-12-13T14:21:46.373337376Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:46.378291 env[1271]: time="2024-12-13T14:21:46.378251005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:46.379075 env[1271]: time="2024-12-13T14:21:46.379056261Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:46.379536 env[1271]: time="2024-12-13T14:21:46.379519989Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:46.380680 env[1271]: time="2024-12-13T14:21:46.380664431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:46.382323 env[1271]: time="2024-12-13T14:21:46.382306168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:46.383733 env[1271]: time="2024-12-13T14:21:46.383712366Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:46.384476 env[1271]: time="2024-12-13T14:21:46.384410168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:46.407356 env[1271]: time="2024-12-13T14:21:46.395509449Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:46.407356 env[1271]: time="2024-12-13T14:21:46.395577488Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:46.407356 env[1271]: time="2024-12-13T14:21:46.395585747Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:46.407356 env[1271]: time="2024-12-13T14:21:46.395669040Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f1f48ceae29c13bbdb3a9ec0cd06a190ef2f25064a7707413d6bc522142969b pid=1731 runtime=io.containerd.runc.v2 Dec 13 14:21:46.407654 env[1271]: time="2024-12-13T14:21:46.395247101Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:46.407654 env[1271]: time="2024-12-13T14:21:46.395289766Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:46.407654 env[1271]: time="2024-12-13T14:21:46.395314571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:46.407654 env[1271]: time="2024-12-13T14:21:46.395466278Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3012e6522bba404777f27933e677586485bb683c07c3cddee2ddc7ef7eee0a84 pid=1732 runtime=io.containerd.runc.v2 Dec 13 14:21:46.418678 systemd[1]: Started cri-containerd-3012e6522bba404777f27933e677586485bb683c07c3cddee2ddc7ef7eee0a84.scope. Dec 13 14:21:46.425376 systemd[1]: Started cri-containerd-8f1f48ceae29c13bbdb3a9ec0cd06a190ef2f25064a7707413d6bc522142969b.scope. Dec 13 14:21:46.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit: BPF prog-id=58 op=LOAD Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1732 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313265363532326262613430343737376632373933336536373735 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1732 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313265363532326262613430343737376632373933336536373735 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.429000 audit: BPF prog-id=59 op=LOAD Dec 13 14:21:46.429000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d60a0 items=0 ppid=1732 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313265363532326262613430343737376632373933336536373735 Dec 13 14:21:46.430000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.430000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.430000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.430000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.430000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.430000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.430000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.430000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.430000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.430000 audit: BPF prog-id=60 op=LOAD Dec 13 14:21:46.430000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d60e8 items=0 ppid=1732 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313265363532326262613430343737376632373933336536373735 Dec 13 14:21:46.431000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:21:46.431000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.431000 audit: BPF prog-id=61 op=LOAD Dec 13 14:21:46.431000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d64f8 items=0 ppid=1732 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313265363532326262613430343737376632373933336536373735 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.436000 audit: BPF prog-id=62 op=LOAD Dec 13 14:21:46.437000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.437000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1731 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866316634386365616532396331336262646233613965633063643036 Dec 13 14:21:46.437000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.437000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1731 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866316634386365616532396331336262646233613965633063643036 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit: BPF prog-id=63 op=LOAD Dec 13 14:21:46.438000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024550 items=0 ppid=1731 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866316634386365616532396331336262646233613965633063643036 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.438000 audit: BPF prog-id=64 op=LOAD Dec 13 14:21:46.438000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024598 items=0 ppid=1731 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866316634386365616532396331336262646233613965633063643036 Dec 13 14:21:46.439000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:21:46.439000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:46.439000 audit: BPF prog-id=65 op=LOAD Dec 13 14:21:46.439000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000249a8 items=0 ppid=1731 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:46.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866316634386365616532396331336262646233613965633063643036 Dec 13 14:21:46.445125 env[1271]: time="2024-12-13T14:21:46.445099653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6dhcq,Uid:c4f9c10e-6f1f-442d-bd4c-9de941b83956,Namespace:calico-system,Attempt:0,} returns sandbox id \"3012e6522bba404777f27933e677586485bb683c07c3cddee2ddc7ef7eee0a84\"" Dec 13 14:21:46.446956 env[1271]: time="2024-12-13T14:21:46.446931054Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:21:46.448172 kubelet[1617]: E1213 14:21:46.448149 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:46.450710 env[1271]: time="2024-12-13T14:21:46.450681038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-twn5n,Uid:6b56cf1d-5086-4445-b5e0-cea556afa1c5,Namespace:kube-system,Attempt:0,} returns sandbox id \"8f1f48ceae29c13bbdb3a9ec0cd06a190ef2f25064a7707413d6bc522142969b\"" Dec 13 14:21:46.585255 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3718353513.mount: Deactivated successfully. Dec 13 14:21:47.448402 kubelet[1617]: E1213 14:21:47.448380 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:47.553537 kubelet[1617]: E1213 14:21:47.553500 1617 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qk6p4" podUID="b71981e5-2664-4520-a27c-9d81d3e2f763" Dec 13 14:21:48.070030 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2484604301.mount: Deactivated successfully. Dec 13 14:21:48.221839 env[1271]: time="2024-12-13T14:21:48.221794258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:48.223127 env[1271]: time="2024-12-13T14:21:48.223099016Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:48.223984 env[1271]: time="2024-12-13T14:21:48.223965716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:48.224865 env[1271]: time="2024-12-13T14:21:48.224838052Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:48.225350 env[1271]: time="2024-12-13T14:21:48.225334000Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:21:48.227184 env[1271]: time="2024-12-13T14:21:48.227155907Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:21:48.228014 env[1271]: time="2024-12-13T14:21:48.227957520Z" level=info msg="CreateContainer within sandbox \"3012e6522bba404777f27933e677586485bb683c07c3cddee2ddc7ef7eee0a84\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:21:48.237720 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1675494143.mount: Deactivated successfully. Dec 13 14:21:48.245927 env[1271]: time="2024-12-13T14:21:48.245893457Z" level=info msg="CreateContainer within sandbox \"3012e6522bba404777f27933e677586485bb683c07c3cddee2ddc7ef7eee0a84\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"52afffa056373969901febc6b48930f0b13db250a577edcae483e4a04ae96779\"" Dec 13 14:21:48.246463 env[1271]: time="2024-12-13T14:21:48.246402021Z" level=info msg="StartContainer for \"52afffa056373969901febc6b48930f0b13db250a577edcae483e4a04ae96779\"" Dec 13 14:21:48.262381 systemd[1]: Started cri-containerd-52afffa056373969901febc6b48930f0b13db250a577edcae483e4a04ae96779.scope. Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.276574 kernel: kauditd_printk_skb: 356 callbacks suppressed Dec 13 14:21:48.276654 kernel: audit: type=1400 audit(1734099708.274:462): avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ffb2598aed8 items=0 ppid=1732 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:48.283061 kernel: audit: type=1300 audit(1734099708.274:462): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ffb2598aed8 items=0 ppid=1732 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:48.283173 kernel: audit: type=1327 audit(1734099708.274:462): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532616666666130353633373339363939303166656263366234383933 Dec 13 14:21:48.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532616666666130353633373339363939303166656263366234383933 Dec 13 14:21:48.286465 kernel: audit: type=1400 audit(1734099708.274:463): avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.291536 kernel: audit: type=1400 audit(1734099708.274:463): avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.291622 kernel: audit: type=1400 audit(1734099708.274:463): avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.296816 kernel: audit: type=1400 audit(1734099708.274:463): avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.296951 kernel: audit: type=1400 audit(1734099708.274:463): avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.302443 kernel: audit: type=1400 audit(1734099708.274:463): avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.305305 kernel: audit: type=1400 audit(1734099708.274:463): avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.274000 audit: BPF prog-id=66 op=LOAD Dec 13 14:21:48.274000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002ea588 items=0 ppid=1732 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:48.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532616666666130353633373339363939303166656263366234383933 Dec 13 14:21:48.278000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.278000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.278000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.278000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.278000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.278000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.278000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.278000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.278000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.278000 audit: BPF prog-id=67 op=LOAD Dec 13 14:21:48.278000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002ea5d8 items=0 ppid=1732 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:48.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532616666666130353633373339363939303166656263366234383933 Dec 13 14:21:48.288000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:21:48.288000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:48.288000 audit: BPF prog-id=68 op=LOAD Dec 13 14:21:48.288000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002ea668 items=0 ppid=1732 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:48.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532616666666130353633373339363939303166656263366234383933 Dec 13 14:21:48.318643 env[1271]: time="2024-12-13T14:21:48.318606466Z" level=info msg="StartContainer for \"52afffa056373969901febc6b48930f0b13db250a577edcae483e4a04ae96779\" returns successfully" Dec 13 14:21:48.321537 systemd[1]: cri-containerd-52afffa056373969901febc6b48930f0b13db250a577edcae483e4a04ae96779.scope: Deactivated successfully. Dec 13 14:21:48.324000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:21:48.443733 env[1271]: time="2024-12-13T14:21:48.443691660Z" level=info msg="shim disconnected" id=52afffa056373969901febc6b48930f0b13db250a577edcae483e4a04ae96779 Dec 13 14:21:48.443733 env[1271]: time="2024-12-13T14:21:48.443730526Z" level=warning msg="cleaning up after shim disconnected" id=52afffa056373969901febc6b48930f0b13db250a577edcae483e4a04ae96779 namespace=k8s.io Dec 13 14:21:48.443733 env[1271]: time="2024-12-13T14:21:48.443738527Z" level=info msg="cleaning up dead shim" Dec 13 14:21:48.448825 kubelet[1617]: E1213 14:21:48.448802 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:48.450372 env[1271]: time="2024-12-13T14:21:48.450346634Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:21:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1844 runtime=io.containerd.runc.v2\n" Dec 13 14:21:49.031354 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-52afffa056373969901febc6b48930f0b13db250a577edcae483e4a04ae96779-rootfs.mount: Deactivated successfully. Dec 13 14:21:49.449898 kubelet[1617]: E1213 14:21:49.449852 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:49.553877 kubelet[1617]: E1213 14:21:49.553560 1617 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qk6p4" podUID="b71981e5-2664-4520-a27c-9d81d3e2f763" Dec 13 14:21:49.564998 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3669595845.mount: Deactivated successfully. Dec 13 14:21:49.995819 env[1271]: time="2024-12-13T14:21:49.995782601Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:49.997538 env[1271]: time="2024-12-13T14:21:49.997515066Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:49.999099 env[1271]: time="2024-12-13T14:21:49.999069147Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:50.000890 env[1271]: time="2024-12-13T14:21:50.000860469Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:50.001091 env[1271]: time="2024-12-13T14:21:50.001069281Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:21:50.002441 env[1271]: time="2024-12-13T14:21:50.002412800Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:21:50.003153 env[1271]: time="2024-12-13T14:21:50.003129483Z" level=info msg="CreateContainer within sandbox \"8f1f48ceae29c13bbdb3a9ec0cd06a190ef2f25064a7707413d6bc522142969b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:21:50.014396 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2179941087.mount: Deactivated successfully. Dec 13 14:21:50.032102 env[1271]: time="2024-12-13T14:21:50.032069478Z" level=info msg="CreateContainer within sandbox \"8f1f48ceae29c13bbdb3a9ec0cd06a190ef2f25064a7707413d6bc522142969b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"24d89d641ce4bc6827a099f9bd13b6cf5e661d107ec46613f502d5b540bc769f\"" Dec 13 14:21:50.032578 env[1271]: time="2024-12-13T14:21:50.032560517Z" level=info msg="StartContainer for \"24d89d641ce4bc6827a099f9bd13b6cf5e661d107ec46613f502d5b540bc769f\"" Dec 13 14:21:50.053095 systemd[1]: Started cri-containerd-24d89d641ce4bc6827a099f9bd13b6cf5e661d107ec46613f502d5b540bc769f.scope. Dec 13 14:21:50.055889 systemd[1]: run-containerd-runc-k8s.io-24d89d641ce4bc6827a099f9bd13b6cf5e661d107ec46613f502d5b540bc769f-runc.rmr1Ko.mount: Deactivated successfully. Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3be8626b08 items=0 ppid=1731 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234643839643634316365346263363832376130393966396264313362 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.066000 audit: BPF prog-id=69 op=LOAD Dec 13 14:21:50.066000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c2798 items=0 ppid=1731 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234643839643634316365346263363832376130393966396264313362 Dec 13 14:21:50.067000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.067000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.067000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.067000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.067000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.067000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.067000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.067000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.067000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.067000 audit: BPF prog-id=70 op=LOAD Dec 13 14:21:50.067000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c27e8 items=0 ppid=1731 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234643839643634316365346263363832376130393966396264313362 Dec 13 14:21:50.067000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:21:50.067000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:50.068000 audit: BPF prog-id=71 op=LOAD Dec 13 14:21:50.068000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c2878 items=0 ppid=1731 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234643839643634316365346263363832376130393966396264313362 Dec 13 14:21:50.087889 env[1271]: time="2024-12-13T14:21:50.087839090Z" level=info msg="StartContainer for \"24d89d641ce4bc6827a099f9bd13b6cf5e661d107ec46613f502d5b540bc769f\" returns successfully" Dec 13 14:21:50.123000 audit[1918]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.123000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc641b2370 a2=0 a3=7ffc641b235c items=0 ppid=1878 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:21:50.123000 audit[1919]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.123000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfe1676c0 a2=0 a3=7ffcfe1676ac items=0 ppid=1878 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:21:50.124000 audit[1920]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.124000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4f5daab0 a2=0 a3=7fff4f5daa9c items=0 ppid=1878 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:21:50.125000 audit[1922]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.125000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5bb4b920 a2=0 a3=7ffd5bb4b90c items=0 ppid=1878 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:21:50.126000 audit[1921]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.126000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb7be8ed0 a2=0 a3=7ffeb7be8ebc items=0 ppid=1878 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:21:50.127000 audit[1923]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.127000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd61744330 a2=0 a3=7ffd6174431c items=0 ppid=1878 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:21:50.224000 audit[1924]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.224000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc694ce030 a2=0 a3=7ffc694ce01c items=0 ppid=1878 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:21:50.226000 audit[1926]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.226000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd43a20220 a2=0 a3=7ffd43a2020c items=0 ppid=1878 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:21:50.229000 audit[1929]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.229000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4f4bdaa0 a2=0 a3=7ffe4f4bda8c items=0 ppid=1878 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:21:50.231000 audit[1930]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.231000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd211c5950 a2=0 a3=7ffd211c593c items=0 ppid=1878 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:21:50.233000 audit[1932]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.233000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6ab35ea0 a2=0 a3=7fff6ab35e8c items=0 ppid=1878 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:21:50.234000 audit[1933]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.234000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe42854b20 a2=0 a3=7ffe42854b0c items=0 ppid=1878 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:21:50.237000 audit[1935]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.237000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffebe9a05e0 a2=0 a3=7ffebe9a05cc items=0 ppid=1878 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:21:50.240000 audit[1938]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.240000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcce05e030 a2=0 a3=7ffcce05e01c items=0 ppid=1878 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:21:50.241000 audit[1939]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.241000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5493b7e0 a2=0 a3=7ffe5493b7cc items=0 ppid=1878 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:21:50.243000 audit[1941]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.243000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6c8d8360 a2=0 a3=7ffc6c8d834c items=0 ppid=1878 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:21:50.244000 audit[1942]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.244000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed6bd38c0 a2=0 a3=7ffed6bd38ac items=0 ppid=1878 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:21:50.248000 audit[1944]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.248000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd71e82da0 a2=0 a3=7ffd71e82d8c items=0 ppid=1878 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:21:50.251000 audit[1947]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.251000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9a4ed0a0 a2=0 a3=7fff9a4ed08c items=0 ppid=1878 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:21:50.254000 audit[1950]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.254000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde7c8a7e0 a2=0 a3=7ffde7c8a7cc items=0 ppid=1878 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:21:50.255000 audit[1951]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.255000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd171d5bf0 a2=0 a3=7ffd171d5bdc items=0 ppid=1878 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:21:50.257000 audit[1953]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.257000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdc12f4c10 a2=0 a3=7ffdc12f4bfc items=0 ppid=1878 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:21:50.314000 audit[1958]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.314000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeefb5c710 a2=0 a3=7ffeefb5c6fc items=0 ppid=1878 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:21:50.315000 audit[1959]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.315000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd65610e80 a2=0 a3=7ffd65610e6c items=0 ppid=1878 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:21:50.317000 audit[1961]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:50.317000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd6c0016b0 a2=0 a3=7ffd6c00169c items=0 ppid=1878 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:21:50.332000 audit[1967]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:50.332000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc1e8c2020 a2=0 a3=7ffc1e8c200c items=0 ppid=1878 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:50.387000 audit[1967]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:50.387000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffc1e8c2020 a2=0 a3=7ffc1e8c200c items=0 ppid=1878 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:50.410000 audit[1975]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.410000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc89b7660 a2=0 a3=7fffc89b764c items=0 ppid=1878 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:21:50.412000 audit[1977]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.412000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff4b677860 a2=0 a3=7fff4b67784c items=0 ppid=1878 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:21:50.416000 audit[1980]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.416000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcfc93b020 a2=0 a3=7ffcfc93b00c items=0 ppid=1878 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:21:50.417000 audit[1981]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.417000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeea8d1330 a2=0 a3=7ffeea8d131c items=0 ppid=1878 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:21:50.419000 audit[1983]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.419000 audit[1983]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa8057ac0 a2=0 a3=7fffa8057aac items=0 ppid=1878 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:21:50.420000 audit[1984]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.420000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2020fe70 a2=0 a3=7ffd2020fe5c items=0 ppid=1878 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:21:50.422000 audit[1986]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.422000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5e3a59d0 a2=0 a3=7ffc5e3a59bc items=0 ppid=1878 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:21:50.424000 audit[1989]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.424000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffea697dd20 a2=0 a3=7ffea697dd0c items=0 ppid=1878 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:21:50.425000 audit[1990]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1990 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.425000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec2049d80 a2=0 a3=7ffec2049d6c items=0 ppid=1878 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:21:50.427000 audit[1992]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.427000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7dc11be0 a2=0 a3=7ffe7dc11bcc items=0 ppid=1878 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:21:50.428000 audit[1993]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.428000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd24b7450 a2=0 a3=7ffcd24b743c items=0 ppid=1878 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:21:50.429000 audit[1995]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.429000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb53bad00 a2=0 a3=7ffdb53bacec items=0 ppid=1878 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:21:50.432000 audit[1998]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.432000 audit[1998]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2cbbab00 a2=0 a3=7ffc2cbbaaec items=0 ppid=1878 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:21:50.435000 audit[2001]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.435000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee9093100 a2=0 a3=7ffee90930ec items=0 ppid=1878 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:21:50.435000 audit[2002]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2002 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.435000 audit[2002]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff0b1d95a0 a2=0 a3=7fff0b1d958c items=0 ppid=1878 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:21:50.437000 audit[2004]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2004 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.437000 audit[2004]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc92779c00 a2=0 a3=7ffc92779bec items=0 ppid=1878 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:21:50.439000 audit[2008]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2008 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.439000 audit[2008]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe88d02770 a2=0 a3=7ffe88d0275c items=0 ppid=1878 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:21:50.440000 audit[2009]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.440000 audit[2009]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0b729400 a2=0 a3=7ffd0b7293ec items=0 ppid=1878 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:21:50.442000 audit[2011]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2011 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.442000 audit[2011]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc3df114a0 a2=0 a3=7ffc3df1148c items=0 ppid=1878 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:21:50.443000 audit[2012]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.443000 audit[2012]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd48e62800 a2=0 a3=7ffd48e627ec items=0 ppid=1878 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:21:50.444000 audit[2014]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.444000 audit[2014]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe3815ed00 a2=0 a3=7ffe3815ecec items=0 ppid=1878 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:21:50.447000 audit[2017]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2017 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:50.447000 audit[2017]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9196ec80 a2=0 a3=7fff9196ec6c items=0 ppid=1878 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:21:50.449000 audit[2019]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2019 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:21:50.449000 audit[2019]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fffeb04d0a0 a2=0 a3=7fffeb04d08c items=0 ppid=1878 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.449000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:50.449000 audit[2019]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2019 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:21:50.449000 audit[2019]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffeb04d0a0 a2=0 a3=7fffeb04d08c items=0 ppid=1878 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.449000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:50.453611 kubelet[1617]: E1213 14:21:50.450334 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:51.450569 kubelet[1617]: E1213 14:21:51.450538 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:51.553651 kubelet[1617]: E1213 14:21:51.553622 1617 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qk6p4" podUID="b71981e5-2664-4520-a27c-9d81d3e2f763" Dec 13 14:21:52.450693 kubelet[1617]: E1213 14:21:52.450646 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:53.451734 kubelet[1617]: E1213 14:21:53.451691 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:53.553669 kubelet[1617]: E1213 14:21:53.553532 1617 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qk6p4" podUID="b71981e5-2664-4520-a27c-9d81d3e2f763" Dec 13 14:21:54.035790 env[1271]: time="2024-12-13T14:21:54.035761341Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:54.036780 env[1271]: time="2024-12-13T14:21:54.036764182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:54.037734 env[1271]: time="2024-12-13T14:21:54.037719134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:54.038599 env[1271]: time="2024-12-13T14:21:54.038581216Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:54.038934 env[1271]: time="2024-12-13T14:21:54.038915121Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:21:54.040632 env[1271]: time="2024-12-13T14:21:54.040613855Z" level=info msg="CreateContainer within sandbox \"3012e6522bba404777f27933e677586485bb683c07c3cddee2ddc7ef7eee0a84\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:21:54.046648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1466434349.mount: Deactivated successfully. Dec 13 14:21:54.048823 env[1271]: time="2024-12-13T14:21:54.048793469Z" level=info msg="CreateContainer within sandbox \"3012e6522bba404777f27933e677586485bb683c07c3cddee2ddc7ef7eee0a84\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c5d4c0352b43218b74fb29bfbc174f078036e0d66f842f120f741a230da83763\"" Dec 13 14:21:54.049321 env[1271]: time="2024-12-13T14:21:54.049274829Z" level=info msg="StartContainer for \"c5d4c0352b43218b74fb29bfbc174f078036e0d66f842f120f741a230da83763\"" Dec 13 14:21:54.062394 systemd[1]: Started cri-containerd-c5d4c0352b43218b74fb29bfbc174f078036e0d66f842f120f741a230da83763.scope. Dec 13 14:21:54.081258 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:21:54.081349 kernel: audit: type=1400 audit(1734099714.073:526): avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.081384 kernel: audit: type=1300 audit(1734099714.073:526): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f2a042aacc8 items=0 ppid=1732 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:54.073000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.073000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f2a042aacc8 items=0 ppid=1732 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:54.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643463303335326234333231386237346662323962666263313734 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.087380 kernel: audit: type=1327 audit(1734099714.073:526): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643463303335326234333231386237346662323962666263313734 Dec 13 14:21:54.087418 kernel: audit: type=1400 audit(1734099714.074:527): avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.087445 kernel: audit: type=1400 audit(1734099714.074:527): avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.095346 kernel: audit: type=1400 audit(1734099714.074:527): avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.095398 kernel: audit: type=1400 audit(1734099714.074:527): avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.097870 kernel: audit: type=1400 audit(1734099714.074:527): avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.099448 kernel: audit: type=1400 audit(1734099714.074:527): avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.103317 kernel: audit: type=1400 audit(1734099714.074:527): avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.074000 audit: BPF prog-id=72 op=LOAD Dec 13 14:21:54.074000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c00027bc58 items=0 ppid=1732 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:54.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643463303335326234333231386237346662323962666263313734 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit: BPF prog-id=73 op=LOAD Dec 13 14:21:54.080000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c00027bca8 items=0 ppid=1732 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:54.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643463303335326234333231386237346662323962666263313734 Dec 13 14:21:54.080000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:21:54.080000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:54.080000 audit: BPF prog-id=74 op=LOAD Dec 13 14:21:54.080000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c00027bd38 items=0 ppid=1732 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:54.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643463303335326234333231386237346662323962666263313734 Dec 13 14:21:54.104154 env[1271]: time="2024-12-13T14:21:54.104133152Z" level=info msg="StartContainer for \"c5d4c0352b43218b74fb29bfbc174f078036e0d66f842f120f741a230da83763\" returns successfully" Dec 13 14:21:54.451926 kubelet[1617]: E1213 14:21:54.451889 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:54.581719 kubelet[1617]: I1213 14:21:54.581677 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-twn5n" podStartSLOduration=8.033265243 podStartE2EDuration="11.581656146s" podCreationTimestamp="2024-12-13 14:21:43 +0000 UTC" firstStartedPulling="2024-12-13 14:21:46.453360946 +0000 UTC m=+3.411701480" lastFinishedPulling="2024-12-13 14:21:50.001751848 +0000 UTC m=+6.960092383" observedRunningTime="2024-12-13 14:21:50.577823184 +0000 UTC m=+7.536163722" watchObservedRunningTime="2024-12-13 14:21:54.581656146 +0000 UTC m=+11.539996683" Dec 13 14:21:55.263745 env[1271]: time="2024-12-13T14:21:55.263708452Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:21:55.265429 systemd[1]: cri-containerd-c5d4c0352b43218b74fb29bfbc174f078036e0d66f842f120f741a230da83763.scope: Deactivated successfully. Dec 13 14:21:55.267000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:21:55.276299 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c5d4c0352b43218b74fb29bfbc174f078036e0d66f842f120f741a230da83763-rootfs.mount: Deactivated successfully. Dec 13 14:21:55.347126 kubelet[1617]: I1213 14:21:55.347107 1617 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:21:55.452195 kubelet[1617]: E1213 14:21:55.452155 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:55.556231 systemd[1]: Created slice kubepods-besteffort-podb71981e5_2664_4520_a27c_9d81d3e2f763.slice. Dec 13 14:21:55.558298 env[1271]: time="2024-12-13T14:21:55.558255123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qk6p4,Uid:b71981e5-2664-4520-a27c-9d81d3e2f763,Namespace:calico-system,Attempt:0,}" Dec 13 14:21:55.670619 env[1271]: time="2024-12-13T14:21:55.670579653Z" level=error msg="Failed to destroy network for sandbox \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:55.671680 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815-shm.mount: Deactivated successfully. Dec 13 14:21:55.671957 env[1271]: time="2024-12-13T14:21:55.671932315Z" level=error msg="encountered an error cleaning up failed sandbox \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:55.672039 env[1271]: time="2024-12-13T14:21:55.672020197Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qk6p4,Uid:b71981e5-2664-4520-a27c-9d81d3e2f763,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:55.672478 kubelet[1617]: E1213 14:21:55.672210 1617 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:55.672478 kubelet[1617]: E1213 14:21:55.672264 1617 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qk6p4" Dec 13 14:21:55.672478 kubelet[1617]: E1213 14:21:55.672291 1617 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qk6p4" Dec 13 14:21:55.672583 kubelet[1617]: E1213 14:21:55.672317 1617 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qk6p4_calico-system(b71981e5-2664-4520-a27c-9d81d3e2f763)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qk6p4_calico-system(b71981e5-2664-4520-a27c-9d81d3e2f763)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qk6p4" podUID="b71981e5-2664-4520-a27c-9d81d3e2f763" Dec 13 14:21:55.713609 env[1271]: time="2024-12-13T14:21:55.713571867Z" level=info msg="shim disconnected" id=c5d4c0352b43218b74fb29bfbc174f078036e0d66f842f120f741a230da83763 Dec 13 14:21:55.713609 env[1271]: time="2024-12-13T14:21:55.713601714Z" level=warning msg="cleaning up after shim disconnected" id=c5d4c0352b43218b74fb29bfbc174f078036e0d66f842f120f741a230da83763 namespace=k8s.io Dec 13 14:21:55.713609 env[1271]: time="2024-12-13T14:21:55.713607467Z" level=info msg="cleaning up dead shim" Dec 13 14:21:55.718521 env[1271]: time="2024-12-13T14:21:55.718492632Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:21:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2096 runtime=io.containerd.runc.v2\n" Dec 13 14:21:56.452983 kubelet[1617]: E1213 14:21:56.452947 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:56.574579 env[1271]: time="2024-12-13T14:21:56.574551627Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:21:56.575459 kubelet[1617]: I1213 14:21:56.575404 1617 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" Dec 13 14:21:56.577437 env[1271]: time="2024-12-13T14:21:56.577415320Z" level=info msg="StopPodSandbox for \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\"" Dec 13 14:21:56.601886 env[1271]: time="2024-12-13T14:21:56.601851600Z" level=error msg="StopPodSandbox for \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\" failed" error="failed to destroy network for sandbox \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:56.602258 kubelet[1617]: E1213 14:21:56.602131 1617 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" Dec 13 14:21:56.602258 kubelet[1617]: E1213 14:21:56.602179 1617 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815"} Dec 13 14:21:56.602258 kubelet[1617]: E1213 14:21:56.602226 1617 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b71981e5-2664-4520-a27c-9d81d3e2f763\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:21:56.602258 kubelet[1617]: E1213 14:21:56.602241 1617 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b71981e5-2664-4520-a27c-9d81d3e2f763\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qk6p4" podUID="b71981e5-2664-4520-a27c-9d81d3e2f763" Dec 13 14:21:56.844188 kubelet[1617]: I1213 14:21:56.844056 1617 topology_manager.go:215] "Topology Admit Handler" podUID="dc8af9f4-a3bc-485a-8c00-779445f2c343" podNamespace="default" podName="nginx-deployment-85f456d6dd-tqzdr" Dec 13 14:21:56.848070 systemd[1]: Created slice kubepods-besteffort-poddc8af9f4_a3bc_485a_8c00_779445f2c343.slice. Dec 13 14:21:56.944752 kubelet[1617]: I1213 14:21:56.944696 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dqw6n\" (UniqueName: \"kubernetes.io/projected/dc8af9f4-a3bc-485a-8c00-779445f2c343-kube-api-access-dqw6n\") pod \"nginx-deployment-85f456d6dd-tqzdr\" (UID: \"dc8af9f4-a3bc-485a-8c00-779445f2c343\") " pod="default/nginx-deployment-85f456d6dd-tqzdr" Dec 13 14:21:57.150562 env[1271]: time="2024-12-13T14:21:57.150497933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-tqzdr,Uid:dc8af9f4-a3bc-485a-8c00-779445f2c343,Namespace:default,Attempt:0,}" Dec 13 14:21:57.399045 env[1271]: time="2024-12-13T14:21:57.399001354Z" level=error msg="Failed to destroy network for sandbox \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:57.400597 env[1271]: time="2024-12-13T14:21:57.400121807Z" level=error msg="encountered an error cleaning up failed sandbox \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:57.400597 env[1271]: time="2024-12-13T14:21:57.400154708Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-tqzdr,Uid:dc8af9f4-a3bc-485a-8c00-779445f2c343,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:57.400060 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a-shm.mount: Deactivated successfully. Dec 13 14:21:57.401168 kubelet[1617]: E1213 14:21:57.400878 1617 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:57.401168 kubelet[1617]: E1213 14:21:57.400928 1617 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-tqzdr" Dec 13 14:21:57.401168 kubelet[1617]: E1213 14:21:57.400968 1617 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-tqzdr" Dec 13 14:21:57.401317 kubelet[1617]: E1213 14:21:57.400996 1617 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-tqzdr_default(dc8af9f4-a3bc-485a-8c00-779445f2c343)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-tqzdr_default(dc8af9f4-a3bc-485a-8c00-779445f2c343)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-tqzdr" podUID="dc8af9f4-a3bc-485a-8c00-779445f2c343" Dec 13 14:21:57.453385 kubelet[1617]: E1213 14:21:57.453349 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:57.577734 kubelet[1617]: I1213 14:21:57.577426 1617 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" Dec 13 14:21:57.577871 env[1271]: time="2024-12-13T14:21:57.577796578Z" level=info msg="StopPodSandbox for \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\"" Dec 13 14:21:57.594590 env[1271]: time="2024-12-13T14:21:57.594542659Z" level=error msg="StopPodSandbox for \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\" failed" error="failed to destroy network for sandbox \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:57.594863 kubelet[1617]: E1213 14:21:57.594763 1617 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" Dec 13 14:21:57.594863 kubelet[1617]: E1213 14:21:57.594798 1617 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a"} Dec 13 14:21:57.594863 kubelet[1617]: E1213 14:21:57.594819 1617 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dc8af9f4-a3bc-485a-8c00-779445f2c343\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:21:57.594863 kubelet[1617]: E1213 14:21:57.594836 1617 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dc8af9f4-a3bc-485a-8c00-779445f2c343\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-tqzdr" podUID="dc8af9f4-a3bc-485a-8c00-779445f2c343" Dec 13 14:21:58.454251 kubelet[1617]: E1213 14:21:58.454217 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:21:59.455221 kubelet[1617]: E1213 14:21:59.455195 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:00.455785 kubelet[1617]: E1213 14:22:00.455752 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:01.455951 kubelet[1617]: E1213 14:22:01.455916 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:02.123952 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3978541697.mount: Deactivated successfully. Dec 13 14:22:02.302354 env[1271]: time="2024-12-13T14:22:02.302309890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:02.305031 env[1271]: time="2024-12-13T14:22:02.305007971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:02.306424 env[1271]: time="2024-12-13T14:22:02.306404554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:02.307490 env[1271]: time="2024-12-13T14:22:02.307468184Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:02.307662 env[1271]: time="2024-12-13T14:22:02.307639020Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:22:02.322832 env[1271]: time="2024-12-13T14:22:02.322789944Z" level=info msg="CreateContainer within sandbox \"3012e6522bba404777f27933e677586485bb683c07c3cddee2ddc7ef7eee0a84\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:22:02.330414 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4034590779.mount: Deactivated successfully. Dec 13 14:22:02.332561 env[1271]: time="2024-12-13T14:22:02.332517145Z" level=info msg="CreateContainer within sandbox \"3012e6522bba404777f27933e677586485bb683c07c3cddee2ddc7ef7eee0a84\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2530b231b53b8c59e30d5fd5e211e03f60a01ac98648e810db6aafbf113f6278\"" Dec 13 14:22:02.333075 env[1271]: time="2024-12-13T14:22:02.333056614Z" level=info msg="StartContainer for \"2530b231b53b8c59e30d5fd5e211e03f60a01ac98648e810db6aafbf113f6278\"" Dec 13 14:22:02.344259 systemd[1]: Started cri-containerd-2530b231b53b8c59e30d5fd5e211e03f60a01ac98648e810db6aafbf113f6278.scope. Dec 13 14:22:02.357000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.361600 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:22:02.361643 kernel: audit: type=1400 audit(1734099722.357:533): avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.361661 kernel: audit: type=1300 audit(1734099722.357:533): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb7e401c8f8 items=0 ppid=1732 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:02.357000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb7e401c8f8 items=0 ppid=1732 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:02.365322 kernel: audit: type=1327 audit(1734099722.357:533): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333062323331623533623863353965333064356664356532313165 Dec 13 14:22:02.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333062323331623533623863353965333064356664356532313165 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.371007 kernel: audit: type=1400 audit(1734099722.358:534): avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.373423 kernel: audit: type=1400 audit(1734099722.358:534): avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.373456 kernel: audit: type=1400 audit(1734099722.358:534): avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.378431 kernel: audit: type=1400 audit(1734099722.358:534): avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.381320 kernel: audit: type=1400 audit(1734099722.358:534): avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.383889 kernel: audit: type=1400 audit(1734099722.358:534): avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.386465 kernel: audit: type=1400 audit(1734099722.358:534): avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.358000 audit: BPF prog-id=75 op=LOAD Dec 13 14:22:02.358000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e3ba8 items=0 ppid=1732 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:02.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333062323331623533623863353965333064356664356532313165 Dec 13 14:22:02.367000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.367000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.367000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.367000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.367000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.367000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.367000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.367000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.367000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.367000 audit: BPF prog-id=76 op=LOAD Dec 13 14:22:02.367000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000e3bf8 items=0 ppid=1732 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:02.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333062323331623533623863353965333064356664356532313165 Dec 13 14:22:02.369000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:22:02.369000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:02.369000 audit: BPF prog-id=77 op=LOAD Dec 13 14:22:02.369000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000e3c88 items=0 ppid=1732 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:02.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333062323331623533623863353965333064356664356532313165 Dec 13 14:22:02.395395 env[1271]: time="2024-12-13T14:22:02.395361821Z" level=info msg="StartContainer for \"2530b231b53b8c59e30d5fd5e211e03f60a01ac98648e810db6aafbf113f6278\" returns successfully" Dec 13 14:22:02.447862 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:22:02.447943 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:22:02.456296 kubelet[1617]: E1213 14:22:02.456246 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:02.608175 kubelet[1617]: I1213 14:22:02.608135 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6dhcq" podStartSLOduration=3.746243717 podStartE2EDuration="19.6081241s" podCreationTimestamp="2024-12-13 14:21:43 +0000 UTC" firstStartedPulling="2024-12-13 14:21:46.446530308 +0000 UTC m=+3.404870838" lastFinishedPulling="2024-12-13 14:22:02.308410681 +0000 UTC m=+19.266751221" observedRunningTime="2024-12-13 14:22:02.605398338 +0000 UTC m=+19.563738880" watchObservedRunningTime="2024-12-13 14:22:02.6081241 +0000 UTC m=+19.566464641" Dec 13 14:22:03.446083 kubelet[1617]: E1213 14:22:03.446049 1617 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:03.457338 kubelet[1617]: E1213 14:22:03.457312 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:03.601188 systemd[1]: run-containerd-runc-k8s.io-2530b231b53b8c59e30d5fd5e211e03f60a01ac98648e810db6aafbf113f6278-runc.9pmJkb.mount: Deactivated successfully. Dec 13 14:22:03.628000 audit[2325]: AVC avc: denied { write } for pid=2325 comm="tee" name="fd" dev="proc" ino=30512 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:03.628000 audit[2325]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc5888a2b a2=241 a3=1b6 items=1 ppid=2275 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.628000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:22:03.628000 audit: PATH item=0 name="/dev/fd/63" inode=30502 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:03.632000 audit[2330]: AVC avc: denied { write } for pid=2330 comm="tee" name="fd" dev="proc" ino=30519 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:03.632000 audit[2330]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2b90ca1a a2=241 a3=1b6 items=1 ppid=2277 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.632000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:22:03.632000 audit: PATH item=0 name="/dev/fd/63" inode=30505 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:03.628000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:03.632000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:03.636000 audit[2344]: AVC avc: denied { write } for pid=2344 comm="tee" name="fd" dev="proc" ino=30526 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:03.636000 audit[2344]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5ed1ea2a a2=241 a3=1b6 items=1 ppid=2278 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.636000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:22:03.636000 audit: PATH item=0 name="/dev/fd/63" inode=30515 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:03.636000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:03.649000 audit[2347]: AVC avc: denied { write } for pid=2347 comm="tee" name="fd" dev="proc" ino=29602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:03.652000 audit[2349]: AVC avc: denied { write } for pid=2349 comm="tee" name="fd" dev="proc" ino=29605 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:03.653000 audit[2354]: AVC avc: denied { write } for pid=2354 comm="tee" name="fd" dev="proc" ino=29608 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:03.649000 audit[2347]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecb90aa2a a2=241 a3=1b6 items=1 ppid=2280 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.649000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:22:03.649000 audit: PATH item=0 name="/dev/fd/63" inode=30516 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:03.649000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:03.653000 audit[2354]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf644ba2a a2=241 a3=1b6 items=1 ppid=2274 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.652000 audit[2349]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8eaeba2c a2=241 a3=1b6 items=1 ppid=2288 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.653000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:22:03.653000 audit: PATH item=0 name="/dev/fd/63" inode=29597 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:03.653000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:03.652000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:22:03.652000 audit: PATH item=0 name="/dev/fd/63" inode=30521 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:03.652000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:03.658000 audit[2361]: AVC avc: denied { write } for pid=2361 comm="tee" name="fd" dev="proc" ino=30534 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:03.658000 audit[2361]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6277ca1b a2=241 a3=1b6 items=1 ppid=2300 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.658000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:22:03.658000 audit: PATH item=0 name="/dev/fd/63" inode=30529 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:03.658000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit: BPF prog-id=78 op=LOAD Dec 13 14:22:03.750000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe02464370 a2=98 a3=3 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.750000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.750000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit: BPF prog-id=79 op=LOAD Dec 13 14:22:03.750000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe02464150 a2=74 a3=540051 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.750000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.750000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.750000 audit: BPF prog-id=80 op=LOAD Dec 13 14:22:03.750000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe02464180 a2=94 a3=2 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.750000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.751000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit: BPF prog-id=81 op=LOAD Dec 13 14:22:03.817000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe02464040 a2=40 a3=1 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.817000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.817000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:22:03.817000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.817000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe02464110 a2=50 a3=7ffe024641f0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.817000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe02464050 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe02464080 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe02463f90 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe024640a0 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe02464080 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe02464070 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe024640a0 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe02464080 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe024640a0 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe02464070 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe024640e0 a2=28 a3=0 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe02463e90 a2=50 a3=1 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit: BPF prog-id=82 op=LOAD Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe02463e90 a2=94 a3=5 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe02463f40 a2=50 a3=1 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe02464060 a2=4 a3=38 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { confidentiality } for pid=2385 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe024640b0 a2=94 a3=6 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { confidentiality } for pid=2385 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe02463860 a2=94 a3=83 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.824000 audit[2385]: AVC avc: denied { confidentiality } for pid=2385 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:03.824000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe02463860 a2=94 a3=83 items=0 ppid=2290 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:03.830000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.830000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.830000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.830000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.830000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.830000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.830000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.830000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.830000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.830000 audit: BPF prog-id=83 op=LOAD Dec 13 14:22:03.830000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc96cb89d0 a2=98 a3=1999999999999999 items=0 ppid=2290 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.830000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:22:03.831000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit: BPF prog-id=84 op=LOAD Dec 13 14:22:03.831000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc96cb88b0 a2=74 a3=ffff items=0 ppid=2290 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.831000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:22:03.831000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:03.831000 audit: BPF prog-id=85 op=LOAD Dec 13 14:22:03.831000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc96cb88f0 a2=40 a3=7ffc96cb8ad0 items=0 ppid=2290 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:03.831000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:22:03.831000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:22:03.981598 systemd-networkd[1059]: vxlan.calico: Link UP Dec 13 14:22:03.981603 systemd-networkd[1059]: vxlan.calico: Gained carrier Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit: BPF prog-id=86 op=LOAD Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd08aab740 a2=98 a3=ffffffff items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit: BPF prog-id=87 op=LOAD Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd08aab550 a2=74 a3=540051 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit: BPF prog-id=88 op=LOAD Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd08aab580 a2=94 a3=2 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd08aab450 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08aab480 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08aab390 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd08aab4a0 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd08aab480 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd08aab470 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd08aab4a0 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08aab480 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08aab4a0 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08aab470 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd08aab4e0 a2=28 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit: BPF prog-id=89 op=LOAD Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd08aab350 a2=40 a3=0 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd08aab340 a2=50 a3=2800 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd08aab340 a2=50 a3=2800 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.000000 audit: BPF prog-id=90 op=LOAD Dec 13 14:22:04.000000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd08aaab60 a2=94 a3=2 items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.001000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.001000 audit: BPF prog-id=91 op=LOAD Dec 13 14:22:04.001000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd08aaac60 a2=94 a3=2d items=0 ppid=2290 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.001000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit: BPF prog-id=92 op=LOAD Dec 13 14:22:04.007000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd2242bcc0 a2=98 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.007000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.007000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit: BPF prog-id=93 op=LOAD Dec 13 14:22:04.007000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2242baa0 a2=74 a3=540051 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.007000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.007000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.007000 audit: BPF prog-id=94 op=LOAD Dec 13 14:22:04.007000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2242bad0 a2=94 a3=2 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.007000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.007000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:22:04.090000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.090000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.090000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.090000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.090000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.090000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.090000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.090000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.090000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.090000 audit: BPF prog-id=95 op=LOAD Dec 13 14:22:04.090000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2242b990 a2=40 a3=1 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.090000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.091000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:22:04.091000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.091000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd2242ba60 a2=50 a3=7ffd2242bb40 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.091000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.099000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.099000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2242b9a0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.099000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.099000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2242b9d0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.099000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.099000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2242b8e0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.099000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.099000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2242b9f0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.099000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.099000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2242b9d0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.099000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.099000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2242b9c0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2242b9f0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2242b9d0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2242b9f0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2242b9c0 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2242ba30 a2=28 a3=0 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd2242b7e0 a2=50 a3=1 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.100000 audit: BPF prog-id=96 op=LOAD Dec 13 14:22:04.100000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd2242b7e0 a2=94 a3=5 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.101000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd2242b890 a2=50 a3=1 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.101000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd2242b9b0 a2=4 a3=38 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.101000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.101000 audit[2436]: AVC avc: denied { confidentiality } for pid=2436 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:04.101000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd2242ba00 a2=94 a3=6 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.101000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { confidentiality } for pid=2436 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:04.102000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd2242b1b0 a2=94 a3=83 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.102000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.102000 audit[2436]: AVC avc: denied { confidentiality } for pid=2436 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:04.102000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd2242b1b0 a2=94 a3=83 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.102000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.103000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2242cbf0 a2=10 a3=f1f00800 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.103000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.103000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2242ca90 a2=10 a3=3 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.103000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.103000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2242ca30 a2=10 a3=3 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.103000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:04.103000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2242ca30 a2=10 a3=7 items=0 ppid=2290 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.103000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:04.109000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:22:04.109000 audit[2219]: SYSCALL arch=c000003e syscall=257 success=no exit=-2 a0=ffffff9c a1=7fff10030f60 a2=80000 a3=0 items=0 ppid=1054 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.109000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:22:04.153000 audit[2474]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:04.153000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff431ebe80 a2=0 a3=7fff431ebe6c items=0 ppid=2290 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.153000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:04.156000 audit[2471]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:04.156000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc2c078d50 a2=0 a3=7ffc2c078d3c items=0 ppid=2290 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.156000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:04.159000 audit[2472]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:04.159000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc4eb34620 a2=0 a3=7ffc4eb3460c items=0 ppid=2290 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.159000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:04.160000 audit[2470]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:04.160000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc6a417630 a2=0 a3=7ffc6a41761c items=0 ppid=2290 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:04.160000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:04.457441 kubelet[1617]: E1213 14:22:04.457408 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:05.348465 systemd-networkd[1059]: vxlan.calico: Gained IPv6LL Dec 13 14:22:05.457968 kubelet[1617]: E1213 14:22:05.457937 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:06.458835 kubelet[1617]: E1213 14:22:06.458800 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:07.458905 kubelet[1617]: E1213 14:22:07.458873 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:08.459941 kubelet[1617]: E1213 14:22:08.459876 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:09.460324 kubelet[1617]: E1213 14:22:09.460296 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:10.461497 kubelet[1617]: E1213 14:22:10.461463 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:11.462000 kubelet[1617]: E1213 14:22:11.461962 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:11.553998 env[1271]: time="2024-12-13T14:22:11.553961582Z" level=info msg="StopPodSandbox for \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\"" Dec 13 14:22:11.554315 env[1271]: time="2024-12-13T14:22:11.554293932Z" level=info msg="StopPodSandbox for \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\"" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.611 [INFO][2524] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.612 [INFO][2524] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" iface="eth0" netns="/var/run/netns/cni-8c7423e4-a0b6-dfea-c396-780d56d03069" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.613 [INFO][2524] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" iface="eth0" netns="/var/run/netns/cni-8c7423e4-a0b6-dfea-c396-780d56d03069" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.615 [INFO][2524] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" iface="eth0" netns="/var/run/netns/cni-8c7423e4-a0b6-dfea-c396-780d56d03069" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.615 [INFO][2524] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.615 [INFO][2524] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.767 [INFO][2535] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" HandleID="k8s-pod-network.20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" Workload="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.767 [INFO][2535] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.767 [INFO][2535] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.774 [WARNING][2535] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" HandleID="k8s-pod-network.20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" Workload="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.774 [INFO][2535] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" HandleID="k8s-pod-network.20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" Workload="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.775 [INFO][2535] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:11.777436 env[1271]: 2024-12-13 14:22:11.776 [INFO][2524] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a" Dec 13 14:22:11.779789 env[1271]: time="2024-12-13T14:22:11.779568005Z" level=info msg="TearDown network for sandbox \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\" successfully" Dec 13 14:22:11.779789 env[1271]: time="2024-12-13T14:22:11.779593224Z" level=info msg="StopPodSandbox for \"20f206d902412586265af8c655a355bb011982b65e455a2095295322bfb3527a\" returns successfully" Dec 13 14:22:11.778803 systemd[1]: run-netns-cni\x2d8c7423e4\x2da0b6\x2ddfea\x2dc396\x2d780d56d03069.mount: Deactivated successfully. Dec 13 14:22:11.780491 env[1271]: time="2024-12-13T14:22:11.780465190Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-tqzdr,Uid:dc8af9f4-a3bc-485a-8c00-779445f2c343,Namespace:default,Attempt:1,}" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.613 [INFO][2523] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.613 [INFO][2523] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" iface="eth0" netns="/var/run/netns/cni-aa764547-c33f-43e6-644f-e61708e406fb" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.613 [INFO][2523] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" iface="eth0" netns="/var/run/netns/cni-aa764547-c33f-43e6-644f-e61708e406fb" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.615 [INFO][2523] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" iface="eth0" netns="/var/run/netns/cni-aa764547-c33f-43e6-644f-e61708e406fb" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.615 [INFO][2523] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.615 [INFO][2523] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.768 [INFO][2536] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" HandleID="k8s-pod-network.c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" Workload="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.768 [INFO][2536] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.776 [INFO][2536] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.781 [WARNING][2536] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" HandleID="k8s-pod-network.c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" Workload="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.781 [INFO][2536] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" HandleID="k8s-pod-network.c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" Workload="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.782 [INFO][2536] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:11.784497 env[1271]: 2024-12-13 14:22:11.783 [INFO][2523] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815" Dec 13 14:22:11.788113 env[1271]: time="2024-12-13T14:22:11.785574489Z" level=info msg="TearDown network for sandbox \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\" successfully" Dec 13 14:22:11.788113 env[1271]: time="2024-12-13T14:22:11.785592057Z" level=info msg="StopPodSandbox for \"c8035b012f1eeb03d9a4f5c301e1fa7290080908ab70cc2ad535fef59dca4815\" returns successfully" Dec 13 14:22:11.785542 systemd[1]: run-netns-cni\x2daa764547\x2dc33f\x2d43e6\x2d644f\x2de61708e406fb.mount: Deactivated successfully. Dec 13 14:22:11.788505 env[1271]: time="2024-12-13T14:22:11.788490932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qk6p4,Uid:b71981e5-2664-4520-a27c-9d81d3e2f763,Namespace:calico-system,Attempt:1,}" Dec 13 14:22:11.868444 systemd-networkd[1059]: cali0af7380ab8b: Link UP Dec 13 14:22:11.870786 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:22:11.870833 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0af7380ab8b: link becomes ready Dec 13 14:22:11.870925 systemd-networkd[1059]: cali0af7380ab8b: Gained carrier Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.821 [INFO][2555] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.135-k8s-csi--node--driver--qk6p4-eth0 csi-node-driver- calico-system b71981e5-2664-4520-a27c-9d81d3e2f763 1131 0 2024-12-13 14:21:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.135 csi-node-driver-qk6p4 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali0af7380ab8b [] []}} ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Namespace="calico-system" Pod="csi-node-driver-qk6p4" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--qk6p4-" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.821 [INFO][2555] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Namespace="calico-system" Pod="csi-node-driver-qk6p4" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.837 [INFO][2576] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" HandleID="k8s-pod-network.a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Workload="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.845 [INFO][2576] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" HandleID="k8s-pod-network.a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Workload="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000313370), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.135", "pod":"csi-node-driver-qk6p4", "timestamp":"2024-12-13 14:22:11.837553706 +0000 UTC"}, Hostname:"10.67.124.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.846 [INFO][2576] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.846 [INFO][2576] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.846 [INFO][2576] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.135' Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.846 [INFO][2576] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" host="10.67.124.135" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.851 [INFO][2576] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.135" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.853 [INFO][2576] ipam/ipam.go 489: Trying affinity for 192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.854 [INFO][2576] ipam/ipam.go 155: Attempting to load block cidr=192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.855 [INFO][2576] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.855 [INFO][2576] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.53.128/26 handle="k8s-pod-network.a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" host="10.67.124.135" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.855 [INFO][2576] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78 Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.857 [INFO][2576] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.53.128/26 handle="k8s-pod-network.a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" host="10.67.124.135" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.860 [INFO][2576] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.53.129/26] block=192.168.53.128/26 handle="k8s-pod-network.a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" host="10.67.124.135" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.860 [INFO][2576] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.53.129/26] handle="k8s-pod-network.a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" host="10.67.124.135" Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.860 [INFO][2576] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:11.876813 env[1271]: 2024-12-13 14:22:11.860 [INFO][2576] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.129/26] IPv6=[] ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" HandleID="k8s-pod-network.a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Workload="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.877325 env[1271]: 2024-12-13 14:22:11.861 [INFO][2555] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Namespace="calico-system" Pod="csi-node-driver-qk6p4" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-csi--node--driver--qk6p4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b71981e5-2664-4520-a27c-9d81d3e2f763", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"", Pod:"csi-node-driver-qk6p4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0af7380ab8b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:11.877325 env[1271]: 2024-12-13 14:22:11.861 [INFO][2555] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.53.129/32] ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Namespace="calico-system" Pod="csi-node-driver-qk6p4" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.877325 env[1271]: 2024-12-13 14:22:11.861 [INFO][2555] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0af7380ab8b ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Namespace="calico-system" Pod="csi-node-driver-qk6p4" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.877325 env[1271]: 2024-12-13 14:22:11.871 [INFO][2555] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Namespace="calico-system" Pod="csi-node-driver-qk6p4" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.877325 env[1271]: 2024-12-13 14:22:11.871 [INFO][2555] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Namespace="calico-system" Pod="csi-node-driver-qk6p4" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-csi--node--driver--qk6p4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b71981e5-2664-4520-a27c-9d81d3e2f763", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78", Pod:"csi-node-driver-qk6p4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0af7380ab8b", MAC:"1e:c0:25:fd:0e:8c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:11.877325 env[1271]: 2024-12-13 14:22:11.875 [INFO][2555] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78" Namespace="calico-system" Pod="csi-node-driver-qk6p4" WorkloadEndpoint="10.67.124.135-k8s-csi--node--driver--qk6p4-eth0" Dec 13 14:22:11.885000 audit[2615]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2615 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:11.887302 env[1271]: time="2024-12-13T14:22:11.887217372Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:11.887381 env[1271]: time="2024-12-13T14:22:11.887366247Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:11.887447 env[1271]: time="2024-12-13T14:22:11.887434640Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:11.887607 env[1271]: time="2024-12-13T14:22:11.887590216Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78 pid=2610 runtime=io.containerd.runc.v2 Dec 13 14:22:11.887773 kernel: kauditd_printk_skb: 550 callbacks suppressed Dec 13 14:22:11.887808 kernel: audit: type=1325 audit(1734099731.885:641): table=filter:69 family=2 entries=34 op=nft_register_chain pid=2615 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:11.885000 audit[2615]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff49862be0 a2=0 a3=7fff49862bcc items=0 ppid=2290 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.893485 kernel: audit: type=1300 audit(1734099731.885:641): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff49862be0 a2=0 a3=7fff49862bcc items=0 ppid=2290 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.893533 kernel: audit: type=1327 audit(1734099731.885:641): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:11.885000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:11.901389 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calice2a454a484: link becomes ready Dec 13 14:22:11.898425 systemd-networkd[1059]: calice2a454a484: Link UP Dec 13 14:22:11.898942 systemd[1]: Started cri-containerd-a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78.scope. Dec 13 14:22:11.899980 systemd-networkd[1059]: calice2a454a484: Gained carrier Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.818 [INFO][2547] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0 nginx-deployment-85f456d6dd- default dc8af9f4-a3bc-485a-8c00-779445f2c343 1130 0 2024-12-13 14:21:56 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.135 nginx-deployment-85f456d6dd-tqzdr eth0 default [] [] [kns.default ksa.default.default] calice2a454a484 [] []}} ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Namespace="default" Pod="nginx-deployment-85f456d6dd-tqzdr" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.819 [INFO][2547] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Namespace="default" Pod="nginx-deployment-85f456d6dd-tqzdr" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.840 [INFO][2575] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" HandleID="k8s-pod-network.1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Workload="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.846 [INFO][2575] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" HandleID="k8s-pod-network.1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Workload="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000313480), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.135", "pod":"nginx-deployment-85f456d6dd-tqzdr", "timestamp":"2024-12-13 14:22:11.840740258 +0000 UTC"}, Hostname:"10.67.124.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.846 [INFO][2575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.860 [INFO][2575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.860 [INFO][2575] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.135' Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.861 [INFO][2575] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" host="10.67.124.135" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.868 [INFO][2575] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.135" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.873 [INFO][2575] ipam/ipam.go 489: Trying affinity for 192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.874 [INFO][2575] ipam/ipam.go 155: Attempting to load block cidr=192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.877 [INFO][2575] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.877 [INFO][2575] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.53.128/26 handle="k8s-pod-network.1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" host="10.67.124.135" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.879 [INFO][2575] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916 Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.882 [INFO][2575] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.53.128/26 handle="k8s-pod-network.1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" host="10.67.124.135" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.885 [INFO][2575] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.53.130/26] block=192.168.53.128/26 handle="k8s-pod-network.1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" host="10.67.124.135" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.885 [INFO][2575] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.53.130/26] handle="k8s-pod-network.1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" host="10.67.124.135" Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.885 [INFO][2575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:11.914397 env[1271]: 2024-12-13 14:22:11.885 [INFO][2575] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.130/26] IPv6=[] ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" HandleID="k8s-pod-network.1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Workload="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.914823 env[1271]: 2024-12-13 14:22:11.896 [INFO][2547] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Namespace="default" Pod="nginx-deployment-85f456d6dd-tqzdr" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"dc8af9f4-a3bc-485a-8c00-779445f2c343", ResourceVersion:"1130", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-tqzdr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calice2a454a484", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:11.914823 env[1271]: 2024-12-13 14:22:11.896 [INFO][2547] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.53.130/32] ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Namespace="default" Pod="nginx-deployment-85f456d6dd-tqzdr" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.914823 env[1271]: 2024-12-13 14:22:11.896 [INFO][2547] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calice2a454a484 ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Namespace="default" Pod="nginx-deployment-85f456d6dd-tqzdr" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.914823 env[1271]: 2024-12-13 14:22:11.900 [INFO][2547] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Namespace="default" Pod="nginx-deployment-85f456d6dd-tqzdr" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.914823 env[1271]: 2024-12-13 14:22:11.900 [INFO][2547] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Namespace="default" Pod="nginx-deployment-85f456d6dd-tqzdr" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"dc8af9f4-a3bc-485a-8c00-779445f2c343", ResourceVersion:"1130", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916", Pod:"nginx-deployment-85f456d6dd-tqzdr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calice2a454a484", MAC:"ba:53:8f:42:bf:57", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:11.914823 env[1271]: 2024-12-13 14:22:11.911 [INFO][2547] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916" Namespace="default" Pod="nginx-deployment-85f456d6dd-tqzdr" WorkloadEndpoint="10.67.124.135-k8s-nginx--deployment--85f456d6dd--tqzdr-eth0" Dec 13 14:22:11.925832 kernel: audit: type=1325 audit(1734099731.913:642): table=filter:70 family=2 entries=38 op=nft_register_chain pid=2641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:11.925892 kernel: audit: type=1300 audit(1734099731.913:642): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe3ec55f40 a2=0 a3=7ffe3ec55f2c items=0 ppid=2290 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.925913 kernel: audit: type=1327 audit(1734099731.913:642): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:11.925927 kernel: audit: type=1400 audit(1734099731.917:643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.913000 audit[2641]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:11.913000 audit[2641]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe3ec55f40 a2=0 a3=7ffe3ec55f2c items=0 ppid=2290 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.913000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:11.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928494 kernel: audit: type=1400 audit(1734099731.917:644): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.929431 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:22:11.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.935466 kernel: audit: type=1400 audit(1734099731.917:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.936008 kernel: audit: type=1400 audit(1734099731.917:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit: BPF prog-id=97 op=LOAD Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2610 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333066313532346436383133363732653366383235386166336461 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2610 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333066313532346436383133363732653366383235386166336461 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.925000 audit: BPF prog-id=98 op=LOAD Dec 13 14:22:11.925000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024910 items=0 ppid=2610 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333066313532346436383133363732653366383235386166336461 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit: BPF prog-id=99 op=LOAD Dec 13 14:22:11.928000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024958 items=0 ppid=2610 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333066313532346436383133363732653366383235386166336461 Dec 13 14:22:11.928000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:22:11.928000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.928000 audit: BPF prog-id=100 op=LOAD Dec 13 14:22:11.928000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024d68 items=0 ppid=2610 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333066313532346436383133363732653366383235386166336461 Dec 13 14:22:11.943628 env[1271]: time="2024-12-13T14:22:11.943597067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qk6p4,Uid:b71981e5-2664-4520-a27c-9d81d3e2f763,Namespace:calico-system,Attempt:1,} returns sandbox id \"a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78\"" Dec 13 14:22:11.944245 env[1271]: time="2024-12-13T14:22:11.943923720Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:11.944245 env[1271]: time="2024-12-13T14:22:11.943945028Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:11.944245 env[1271]: time="2024-12-13T14:22:11.943951938Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:11.945319 env[1271]: time="2024-12-13T14:22:11.945289834Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:22:11.945445 env[1271]: time="2024-12-13T14:22:11.945421009Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916 pid=2667 runtime=io.containerd.runc.v2 Dec 13 14:22:11.953786 systemd[1]: Started cri-containerd-1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916.scope. Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.960000 audit: BPF prog-id=101 op=LOAD Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162643562383237373030663463363432343661323239346535346138 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162643562383237373030663463363432343661323239346535346138 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit: BPF prog-id=102 op=LOAD Dec 13 14:22:11.961000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024e90 items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162643562383237373030663463363432343661323239346535346138 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit: BPF prog-id=103 op=LOAD Dec 13 14:22:11.961000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024ed8 items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162643562383237373030663463363432343661323239346535346138 Dec 13 14:22:11.961000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:22:11.961000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:11.961000 audit: BPF prog-id=104 op=LOAD Dec 13 14:22:11.961000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0000252e8 items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:11.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162643562383237373030663463363432343661323239346535346138 Dec 13 14:22:11.963927 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:22:11.982155 env[1271]: time="2024-12-13T14:22:11.982128863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-tqzdr,Uid:dc8af9f4-a3bc-485a-8c00-779445f2c343,Namespace:default,Attempt:1,} returns sandbox id \"1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916\"" Dec 13 14:22:12.462727 kubelet[1617]: E1213 14:22:12.462697 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:13.092542 systemd-networkd[1059]: cali0af7380ab8b: Gained IPv6LL Dec 13 14:22:13.092751 systemd-networkd[1059]: calice2a454a484: Gained IPv6LL Dec 13 14:22:13.256667 env[1271]: time="2024-12-13T14:22:13.256613213Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:13.257275 env[1271]: time="2024-12-13T14:22:13.257258962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:13.257945 env[1271]: time="2024-12-13T14:22:13.257931217Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:13.258601 env[1271]: time="2024-12-13T14:22:13.258587126Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:13.258895 env[1271]: time="2024-12-13T14:22:13.258878718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:22:13.259866 env[1271]: time="2024-12-13T14:22:13.259850887Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:22:13.260285 env[1271]: time="2024-12-13T14:22:13.260264137Z" level=info msg="CreateContainer within sandbox \"a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:22:13.266412 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2073871649.mount: Deactivated successfully. Dec 13 14:22:13.273410 env[1271]: time="2024-12-13T14:22:13.273384551Z" level=info msg="CreateContainer within sandbox \"a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d432d2e012afd7e8882bdf2a8fb7db836d6d287136727032b7444cfde1bedfb5\"" Dec 13 14:22:13.273935 env[1271]: time="2024-12-13T14:22:13.273922274Z" level=info msg="StartContainer for \"d432d2e012afd7e8882bdf2a8fb7db836d6d287136727032b7444cfde1bedfb5\"" Dec 13 14:22:13.289876 systemd[1]: Started cri-containerd-d432d2e012afd7e8882bdf2a8fb7db836d6d287136727032b7444cfde1bedfb5.scope. Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1cbf3197a8 items=0 ppid=2610 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:13.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434333264326530313261666437653838383262646632613866623764 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit: BPF prog-id=105 op=LOAD Dec 13 14:22:13.299000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000311f48 items=0 ppid=2610 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:13.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434333264326530313261666437653838383262646632613866623764 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.299000 audit: BPF prog-id=106 op=LOAD Dec 13 14:22:13.299000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000311f98 items=0 ppid=2610 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:13.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434333264326530313261666437653838383262646632613866623764 Dec 13 14:22:13.301000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:22:13.301000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:13.301000 audit: BPF prog-id=107 op=LOAD Dec 13 14:22:13.301000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000378028 items=0 ppid=2610 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:13.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434333264326530313261666437653838383262646632613866623764 Dec 13 14:22:13.326173 env[1271]: time="2024-12-13T14:22:13.326147107Z" level=info msg="StartContainer for \"d432d2e012afd7e8882bdf2a8fb7db836d6d287136727032b7444cfde1bedfb5\" returns successfully" Dec 13 14:22:13.463712 kubelet[1617]: E1213 14:22:13.463620 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:13.779386 systemd[1]: run-containerd-runc-k8s.io-d432d2e012afd7e8882bdf2a8fb7db836d6d287136727032b7444cfde1bedfb5-runc.DvvBPH.mount: Deactivated successfully. Dec 13 14:22:14.464600 kubelet[1617]: E1213 14:22:14.464568 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:15.465423 kubelet[1617]: E1213 14:22:15.465382 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:15.688743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2266562077.mount: Deactivated successfully. Dec 13 14:22:16.465606 kubelet[1617]: E1213 14:22:16.465580 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:16.953150 env[1271]: time="2024-12-13T14:22:16.953118976Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:16.954151 env[1271]: time="2024-12-13T14:22:16.954133311Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:16.955622 env[1271]: time="2024-12-13T14:22:16.955606004Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:16.956852 env[1271]: time="2024-12-13T14:22:16.956835184Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:16.957247 env[1271]: time="2024-12-13T14:22:16.957228754Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:22:16.958464 env[1271]: time="2024-12-13T14:22:16.958446322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:22:16.959251 env[1271]: time="2024-12-13T14:22:16.959230147Z" level=info msg="CreateContainer within sandbox \"1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:22:16.964770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount246711193.mount: Deactivated successfully. Dec 13 14:22:16.968176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount284535234.mount: Deactivated successfully. Dec 13 14:22:16.977870 env[1271]: time="2024-12-13T14:22:16.977846981Z" level=info msg="CreateContainer within sandbox \"1bd5b827700f4c64246a2294e54a86b9232cf6345d3ded819e9932e83173e916\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3b75468aafab5fe42fd519ed140bec54119052e9fccc22ec67a7ccde22769202\"" Dec 13 14:22:16.978405 env[1271]: time="2024-12-13T14:22:16.978392205Z" level=info msg="StartContainer for \"3b75468aafab5fe42fd519ed140bec54119052e9fccc22ec67a7ccde22769202\"" Dec 13 14:22:16.989905 systemd[1]: Started cri-containerd-3b75468aafab5fe42fd519ed140bec54119052e9fccc22ec67a7ccde22769202.scope. Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.999795 kernel: kauditd_printk_skb: 153 callbacks suppressed Dec 13 14:22:16.999835 kernel: audit: type=1400 audit(1734099736.998:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002296 kernel: audit: type=1400 audit(1734099736.998:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.007033 kernel: audit: type=1400 audit(1734099736.998:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.007084 kernel: audit: type=1400 audit(1734099736.998:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.011898 kernel: audit: type=1400 audit(1734099736.998:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.011942 kernel: audit: type=1400 audit(1734099736.998:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.017191 kernel: audit: type=1400 audit(1734099736.998:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.022689 kernel: audit: type=1400 audit(1734099736.998:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.022739 kernel: audit: type=1400 audit(1734099736.998:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.025393 kernel: audit: type=1400 audit(1734099736.998:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit: BPF prog-id=108 op=LOAD Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2667 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:16.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373534363861616661623566653432666435313965643134306265 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2667 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:16.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373534363861616661623566653432666435313965643134306265 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:16.998000 audit: BPF prog-id=109 op=LOAD Dec 13 14:22:16.998000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002cdd10 items=0 ppid=2667 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:16.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373534363861616661623566653432666435313965643134306265 Dec 13 14:22:17.002000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.002000 audit: BPF prog-id=110 op=LOAD Dec 13 14:22:17.002000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002cdd58 items=0 ppid=2667 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:17.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373534363861616661623566653432666435313965643134306265 Dec 13 14:22:17.006000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:22:17.006000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:17.006000 audit: BPF prog-id=111 op=LOAD Dec 13 14:22:17.006000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000338168 items=0 ppid=2667 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:17.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373534363861616661623566653432666435313965643134306265 Dec 13 14:22:17.031442 env[1271]: time="2024-12-13T14:22:17.031421358Z" level=info msg="StartContainer for \"3b75468aafab5fe42fd519ed140bec54119052e9fccc22ec67a7ccde22769202\" returns successfully" Dec 13 14:22:17.466228 kubelet[1617]: E1213 14:22:17.466188 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:17.627459 kubelet[1617]: I1213 14:22:17.627421 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-tqzdr" podStartSLOduration=16.652233078 podStartE2EDuration="21.627409317s" podCreationTimestamp="2024-12-13 14:21:56 +0000 UTC" firstStartedPulling="2024-12-13 14:22:11.982834317 +0000 UTC m=+28.941174848" lastFinishedPulling="2024-12-13 14:22:16.958010553 +0000 UTC m=+33.916351087" observedRunningTime="2024-12-13 14:22:17.62730029 +0000 UTC m=+34.585640827" watchObservedRunningTime="2024-12-13 14:22:17.627409317 +0000 UTC m=+34.585749859" Dec 13 14:22:18.467221 kubelet[1617]: E1213 14:22:18.467187 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:18.495357 env[1271]: time="2024-12-13T14:22:18.495321674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:18.496112 env[1271]: time="2024-12-13T14:22:18.496094017Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:18.496882 env[1271]: time="2024-12-13T14:22:18.496869088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:18.497591 env[1271]: time="2024-12-13T14:22:18.497578093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:18.497891 env[1271]: time="2024-12-13T14:22:18.497873476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:22:18.499460 env[1271]: time="2024-12-13T14:22:18.499444750Z" level=info msg="CreateContainer within sandbox \"a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:22:18.507631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3486333590.mount: Deactivated successfully. Dec 13 14:22:18.510257 env[1271]: time="2024-12-13T14:22:18.510233594Z" level=info msg="CreateContainer within sandbox \"a030f1524d6813672e3f8258af3da15592b4a3fe51e4ae960209aeb1b247bb78\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2a3e73328cac541b6904386df2dfde6a5fe98fa49a23e33b2ef4f9ff36bc98b8\"" Dec 13 14:22:18.510770 env[1271]: time="2024-12-13T14:22:18.510749185Z" level=info msg="StartContainer for \"2a3e73328cac541b6904386df2dfde6a5fe98fa49a23e33b2ef4f9ff36bc98b8\"" Dec 13 14:22:18.523369 systemd[1]: Started cri-containerd-2a3e73328cac541b6904386df2dfde6a5fe98fa49a23e33b2ef4f9ff36bc98b8.scope. Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff65c680b48 items=0 ppid=2610 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261336537333332386361633534316236393034333836646632646664 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit: BPF prog-id=112 op=LOAD Dec 13 14:22:18.538000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00009ce58 items=0 ppid=2610 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261336537333332386361633534316236393034333836646632646664 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit: BPF prog-id=113 op=LOAD Dec 13 14:22:18.538000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00009cea8 items=0 ppid=2610 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261336537333332386361633534316236393034333836646632646664 Dec 13 14:22:18.538000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:22:18.538000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.538000 audit: BPF prog-id=114 op=LOAD Dec 13 14:22:18.538000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00009cf38 items=0 ppid=2610 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261336537333332386361633534316236393034333836646632646664 Dec 13 14:22:18.550693 env[1271]: time="2024-12-13T14:22:18.550669451Z" level=info msg="StartContainer for \"2a3e73328cac541b6904386df2dfde6a5fe98fa49a23e33b2ef4f9ff36bc98b8\" returns successfully" Dec 13 14:22:18.631660 kubelet[1617]: I1213 14:22:18.631630 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-qk6p4" podStartSLOduration=29.07807945 podStartE2EDuration="35.631618921s" podCreationTimestamp="2024-12-13 14:21:43 +0000 UTC" firstStartedPulling="2024-12-13 14:22:11.945003779 +0000 UTC m=+28.903344312" lastFinishedPulling="2024-12-13 14:22:18.49854325 +0000 UTC m=+35.456883783" observedRunningTime="2024-12-13 14:22:18.630764617 +0000 UTC m=+35.589105162" watchObservedRunningTime="2024-12-13 14:22:18.631618921 +0000 UTC m=+35.589959456" Dec 13 14:22:18.963601 systemd[1]: run-containerd-runc-k8s.io-2a3e73328cac541b6904386df2dfde6a5fe98fa49a23e33b2ef4f9ff36bc98b8-runc.ZbYp13.mount: Deactivated successfully. Dec 13 14:22:19.467583 kubelet[1617]: E1213 14:22:19.467556 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:19.519488 kubelet[1617]: I1213 14:22:19.519455 1617 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:22:19.519488 kubelet[1617]: I1213 14:22:19.519475 1617 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:22:20.468508 kubelet[1617]: E1213 14:22:20.468477 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:20.767000 audit[2839]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:20.767000 audit[2839]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcbd9b2fa0 a2=0 a3=7ffcbd9b2f8c items=0 ppid=1878 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.767000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:20.772000 audit[2839]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:20.772000 audit[2839]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcbd9b2fa0 a2=0 a3=0 items=0 ppid=1878 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:20.790000 audit[2843]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:20.790000 audit[2843]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffdd66d000 a2=0 a3=7fffdd66cfec items=0 ppid=1878 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:20.795000 audit[2843]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:20.795000 audit[2843]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffdd66d000 a2=0 a3=0 items=0 ppid=1878 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:20.920246 kubelet[1617]: I1213 14:22:20.920219 1617 topology_manager.go:215] "Topology Admit Handler" podUID="d35641b5-50e5-4fd4-99d5-184ed160abc2" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:22:20.923989 systemd[1]: Created slice kubepods-besteffort-podd35641b5_50e5_4fd4_99d5_184ed160abc2.slice. Dec 13 14:22:21.076232 kubelet[1617]: I1213 14:22:21.075771 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gmf4h\" (UniqueName: \"kubernetes.io/projected/d35641b5-50e5-4fd4-99d5-184ed160abc2-kube-api-access-gmf4h\") pod \"nfs-server-provisioner-0\" (UID: \"d35641b5-50e5-4fd4-99d5-184ed160abc2\") " pod="default/nfs-server-provisioner-0" Dec 13 14:22:21.076438 kubelet[1617]: I1213 14:22:21.076426 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/d35641b5-50e5-4fd4-99d5-184ed160abc2-data\") pod \"nfs-server-provisioner-0\" (UID: \"d35641b5-50e5-4fd4-99d5-184ed160abc2\") " pod="default/nfs-server-provisioner-0" Dec 13 14:22:21.225889 env[1271]: time="2024-12-13T14:22:21.225842454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d35641b5-50e5-4fd4-99d5-184ed160abc2,Namespace:default,Attempt:0,}" Dec 13 14:22:21.318048 systemd-networkd[1059]: cali60e51b789ff: Link UP Dec 13 14:22:21.320218 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:22:21.320332 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:22:21.320217 systemd-networkd[1059]: cali60e51b789ff: Gained carrier Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.253 [INFO][2845] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.135-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default d35641b5-50e5-4fd4-99d5-184ed160abc2 1195 0 2024-12-13 14:22:20 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.135 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.253 [INFO][2845] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.276 [INFO][2857] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" HandleID="k8s-pod-network.4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Workload="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.289 [INFO][2857] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" HandleID="k8s-pod-network.4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Workload="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003bf160), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.135", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:22:21.276865799 +0000 UTC"}, Hostname:"10.67.124.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.289 [INFO][2857] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.289 [INFO][2857] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.289 [INFO][2857] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.135' Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.290 [INFO][2857] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" host="10.67.124.135" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.292 [INFO][2857] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.135" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.295 [INFO][2857] ipam/ipam.go 489: Trying affinity for 192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.296 [INFO][2857] ipam/ipam.go 155: Attempting to load block cidr=192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.297 [INFO][2857] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.297 [INFO][2857] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.53.128/26 handle="k8s-pod-network.4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" host="10.67.124.135" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.298 [INFO][2857] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.309 [INFO][2857] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.53.128/26 handle="k8s-pod-network.4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" host="10.67.124.135" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.314 [INFO][2857] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.53.131/26] block=192.168.53.128/26 handle="k8s-pod-network.4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" host="10.67.124.135" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.314 [INFO][2857] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.53.131/26] handle="k8s-pod-network.4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" host="10.67.124.135" Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.314 [INFO][2857] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:21.334307 env[1271]: 2024-12-13 14:22:21.314 [INFO][2857] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.131/26] IPv6=[] ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" HandleID="k8s-pod-network.4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Workload="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:22:21.334819 env[1271]: 2024-12-13 14:22:21.315 [INFO][2845] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d35641b5-50e5-4fd4-99d5-184ed160abc2", ResourceVersion:"1195", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.53.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:21.334819 env[1271]: 2024-12-13 14:22:21.315 [INFO][2845] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.53.131/32] ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:22:21.334819 env[1271]: 2024-12-13 14:22:21.315 [INFO][2845] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:22:21.334819 env[1271]: 2024-12-13 14:22:21.320 [INFO][2845] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:22:21.334938 env[1271]: 2024-12-13 14:22:21.320 [INFO][2845] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d35641b5-50e5-4fd4-99d5-184ed160abc2", ResourceVersion:"1195", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.53.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"8e:5b:23:54:f6:b9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:21.334938 env[1271]: 2024-12-13 14:22:21.331 [INFO][2845] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.135-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:22:21.346000 audit[2890]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2890 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:21.346000 audit[2890]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fffa99f9710 a2=0 a3=7fffa99f96fc items=0 ppid=2290 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:21.346000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:21.347163 env[1271]: time="2024-12-13T14:22:21.347124753Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:21.347214 env[1271]: time="2024-12-13T14:22:21.347183321Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:21.347214 env[1271]: time="2024-12-13T14:22:21.347199495Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:21.347436 env[1271]: time="2024-12-13T14:22:21.347411389Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe pid=2884 runtime=io.containerd.runc.v2 Dec 13 14:22:21.359602 systemd[1]: Started cri-containerd-4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe.scope. Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.368000 audit: BPF prog-id=115 op=LOAD Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:21.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643037623439356633366334353735626236333730623362656161 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:21.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643037623439356633366334353735626236333730623362656161 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit: BPF prog-id=116 op=LOAD Dec 13 14:22:21.369000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000259ce0 items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:21.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643037623439356633366334353735626236333730623362656161 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit: BPF prog-id=117 op=LOAD Dec 13 14:22:21.369000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000259d28 items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:21.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643037623439356633366334353735626236333730623362656161 Dec 13 14:22:21.369000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:22:21.369000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:21.369000 audit: BPF prog-id=118 op=LOAD Dec 13 14:22:21.369000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00035c138 items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:21.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643037623439356633366334353735626236333730623362656161 Dec 13 14:22:21.370848 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:22:21.389730 env[1271]: time="2024-12-13T14:22:21.389700064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d35641b5-50e5-4fd4-99d5-184ed160abc2,Namespace:default,Attempt:0,} returns sandbox id \"4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe\"" Dec 13 14:22:21.390658 env[1271]: time="2024-12-13T14:22:21.390642846Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:22:21.469058 kubelet[1617]: E1213 14:22:21.469025 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:22.191922 systemd[1]: run-containerd-runc-k8s.io-4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe-runc.vbJtrK.mount: Deactivated successfully. Dec 13 14:22:22.470240 kubelet[1617]: E1213 14:22:22.470005 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:22.756408 systemd-networkd[1059]: cali60e51b789ff: Gained IPv6LL Dec 13 14:22:23.446401 kubelet[1617]: E1213 14:22:23.446375 1617 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:23.470705 kubelet[1617]: E1213 14:22:23.470664 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:23.513288 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1906498268.mount: Deactivated successfully. Dec 13 14:22:24.471618 kubelet[1617]: E1213 14:22:24.471585 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:25.472300 kubelet[1617]: E1213 14:22:25.472259 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:25.601231 env[1271]: time="2024-12-13T14:22:25.601188615Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:25.613084 env[1271]: time="2024-12-13T14:22:25.613053559Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:25.620553 env[1271]: time="2024-12-13T14:22:25.620522877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:25.625766 env[1271]: time="2024-12-13T14:22:25.623133496Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:25.625766 env[1271]: time="2024-12-13T14:22:25.623491698Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:22:25.632248 env[1271]: time="2024-12-13T14:22:25.632226127Z" level=info msg="CreateContainer within sandbox \"4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:22:25.679060 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2346416646.mount: Deactivated successfully. Dec 13 14:22:25.682771 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount446704356.mount: Deactivated successfully. Dec 13 14:22:25.710352 env[1271]: time="2024-12-13T14:22:25.710323195Z" level=info msg="CreateContainer within sandbox \"4ad07b495f36c4575bb6370b3beaa2d06bb7463179ae461b0fc704bd3c7c68fe\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"3beddbf3abb78f26c950fe53dadb9469d96143bd62eaa21be648e73b0d9a8c70\"" Dec 13 14:22:25.717808 env[1271]: time="2024-12-13T14:22:25.710830450Z" level=info msg="StartContainer for \"3beddbf3abb78f26c950fe53dadb9469d96143bd62eaa21be648e73b0d9a8c70\"" Dec 13 14:22:25.738880 systemd[1]: Started cri-containerd-3beddbf3abb78f26c950fe53dadb9469d96143bd62eaa21be648e73b0d9a8c70.scope. Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.751729 kernel: kauditd_printk_skb: 162 callbacks suppressed Dec 13 14:22:25.751781 kernel: audit: type=1400 audit(1734099745.750:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.756363 kernel: audit: type=1400 audit(1734099745.750:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.756404 kernel: audit: type=1400 audit(1734099745.750:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.758868 kernel: audit: type=1400 audit(1734099745.750:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761497 kernel: audit: type=1400 audit(1734099745.750:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.766535 kernel: audit: type=1400 audit(1734099745.750:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.766708 kernel: audit: type=1400 audit(1734099745.750:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.772316 kernel: audit: type=1400 audit(1734099745.750:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.772365 kernel: audit: type=1400 audit(1734099745.750:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.777131 kernel: audit: type=1400 audit(1734099745.750:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit: BPF prog-id=119 op=LOAD Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2884 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:25.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362656464626633616262373866323663393530666535336461646239 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2884 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:25.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362656464626633616262373866323663393530666535336461646239 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.750000 audit: BPF prog-id=120 op=LOAD Dec 13 14:22:25.750000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e0c30 items=0 ppid=2884 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:25.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362656464626633616262373866323663393530666535336461646239 Dec 13 14:22:25.753000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.753000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.753000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.753000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.753000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.753000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.753000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.753000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.753000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.753000 audit: BPF prog-id=121 op=LOAD Dec 13 14:22:25.753000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e0c78 items=0 ppid=2884 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:25.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362656464626633616262373866323663393530666535336461646239 Dec 13 14:22:25.761000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:22:25.761000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:25.761000 audit: BPF prog-id=122 op=LOAD Dec 13 14:22:25.761000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001e1088 items=0 ppid=2884 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:25.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362656464626633616262373866323663393530666535336461646239 Dec 13 14:22:25.798525 env[1271]: time="2024-12-13T14:22:25.798460006Z" level=info msg="StartContainer for \"3beddbf3abb78f26c950fe53dadb9469d96143bd62eaa21be648e73b0d9a8c70\" returns successfully" Dec 13 14:22:25.816000 audit[2962]: AVC avc: denied { search } for pid=2962 comm="rpcbind" name="crypto" dev="proc" ino=33980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:22:25.816000 audit[2962]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f66448e40c0 a2=0 a3=0 items=0 ppid=2945 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 key=(null) Dec 13 14:22:25.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:22:25.849000 audit[2967]: AVC avc: denied { search } for pid=2967 comm="dbus-daemon" name="crypto" dev="proc" ino=33980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:22:25.849000 audit[2967]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0e944040c0 a2=0 a3=0 items=0 ppid=2945 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 key=(null) Dec 13 14:22:25.849000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:22:25.851000 audit[2968]: AVC avc: denied { watch } for pid=2968 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=529735 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c887 tclass=dir permissive=0 Dec 13 14:22:25.851000 audit[2968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56341442f040 a2=2c8 a3=7ffc588d5dbc items=0 ppid=2945 pid=2968 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 key=(null) Dec 13 14:22:25.851000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:22:25.858000 audit[2969]: AVC avc: denied { read } for pid=2969 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=34972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:22:25.858000 audit[2969]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f5d5fe6d320 a1=80000 a2=d a3=7ffcf7203550 items=0 ppid=2945 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 key=(null) Dec 13 14:22:25.858000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:22:25.858000 audit[2969]: AVC avc: denied { search } for pid=2969 comm="ganesha.nfsd" name="crypto" dev="proc" ino=33980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:22:25.858000 audit[2969]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5d5f3c10c0 a2=0 a3=0 items=0 ppid=2945 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c887 key=(null) Dec 13 14:22:25.858000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:22:26.472499 kubelet[1617]: E1213 14:22:26.472465 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:26.646749 kubelet[1617]: I1213 14:22:26.646713 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.412958032 podStartE2EDuration="6.646701384s" podCreationTimestamp="2024-12-13 14:22:20 +0000 UTC" firstStartedPulling="2024-12-13 14:22:21.390449081 +0000 UTC m=+38.348789611" lastFinishedPulling="2024-12-13 14:22:25.624192428 +0000 UTC m=+42.582532963" observedRunningTime="2024-12-13 14:22:26.646038067 +0000 UTC m=+43.604378604" watchObservedRunningTime="2024-12-13 14:22:26.646701384 +0000 UTC m=+43.605041921" Dec 13 14:22:26.684000 audit[2990]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:26.684000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf5e1ed70 a2=0 a3=7ffdf5e1ed5c items=0 ppid=1878 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:26.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:26.689000 audit[2990]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:26.689000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdf5e1ed70 a2=0 a3=7ffdf5e1ed5c items=0 ppid=1878 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:26.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:27.472804 kubelet[1617]: E1213 14:22:27.472769 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:28.473518 kubelet[1617]: E1213 14:22:28.473488 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:29.474599 kubelet[1617]: E1213 14:22:29.474567 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:29.913915 systemd[1]: run-containerd-runc-k8s.io-2530b231b53b8c59e30d5fd5e211e03f60a01ac98648e810db6aafbf113f6278-runc.VNx4er.mount: Deactivated successfully. Dec 13 14:22:30.475731 kubelet[1617]: E1213 14:22:30.475691 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:31.476291 kubelet[1617]: E1213 14:22:31.476246 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:32.477014 kubelet[1617]: E1213 14:22:32.476977 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:33.477418 kubelet[1617]: E1213 14:22:33.477390 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:34.477773 kubelet[1617]: E1213 14:22:34.477741 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:35.478827 kubelet[1617]: E1213 14:22:35.478799 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:35.892698 kubelet[1617]: I1213 14:22:35.892663 1617 topology_manager.go:215] "Topology Admit Handler" podUID="295cc76c-e7fa-4e45-9397-d8438ea921fb" podNamespace="default" podName="test-pod-1" Dec 13 14:22:35.896522 systemd[1]: Created slice kubepods-besteffort-pod295cc76c_e7fa_4e45_9397_d8438ea921fb.slice. Dec 13 14:22:36.039644 kubelet[1617]: I1213 14:22:36.039611 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-9feeadf4-9295-43b4-818b-0a14ec8fb3bd\" (UniqueName: \"kubernetes.io/nfs/295cc76c-e7fa-4e45-9397-d8438ea921fb-pvc-9feeadf4-9295-43b4-818b-0a14ec8fb3bd\") pod \"test-pod-1\" (UID: \"295cc76c-e7fa-4e45-9397-d8438ea921fb\") " pod="default/test-pod-1" Dec 13 14:22:36.039908 kubelet[1617]: I1213 14:22:36.039822 1617 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c24jk\" (UniqueName: \"kubernetes.io/projected/295cc76c-e7fa-4e45-9397-d8438ea921fb-kube-api-access-c24jk\") pod \"test-pod-1\" (UID: \"295cc76c-e7fa-4e45-9397-d8438ea921fb\") " pod="default/test-pod-1" Dec 13 14:22:36.217597 kernel: Failed to create system directory netfs Dec 13 14:22:36.217695 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:22:36.217718 kernel: audit: type=1400 audit(1734099756.209:757): avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.217745 kernel: Failed to create system directory netfs Dec 13 14:22:36.217763 kernel: audit: type=1400 audit(1734099756.209:757): avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.217780 kernel: Failed to create system directory netfs Dec 13 14:22:36.221904 kernel: audit: type=1400 audit(1734099756.209:757): avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.221950 kernel: Failed to create system directory netfs Dec 13 14:22:36.209000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.229005 kernel: audit: type=1400 audit(1734099756.209:757): avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.209000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.209000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.209000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.209000 audit[3022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e34f2a45e0 a1=153bc a2=55e34ade02b0 a3=5 items=0 ppid=486 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.235971 kernel: audit: type=1300 audit(1734099756.209:757): arch=c000003e syscall=175 success=yes exit=0 a0=55e34f2a45e0 a1=153bc a2=55e34ade02b0 a3=5 items=0 ppid=486 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.236012 kernel: audit: type=1327 audit(1734099756.209:757): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:22:36.236029 kernel: Failed to create system directory fscache Dec 13 14:22:36.209000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:22:36.264015 kernel: audit: type=1400 audit(1734099756.233:758): avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.264048 kernel: Failed to create system directory fscache Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.267490 kernel: audit: type=1400 audit(1734099756.233:758): avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.267529 kernel: Failed to create system directory fscache Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.270921 kernel: audit: type=1400 audit(1734099756.233:758): avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.270996 kernel: Failed to create system directory fscache Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.274184 kernel: audit: type=1400 audit(1734099756.233:758): avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.274212 kernel: Failed to create system directory fscache Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.275429 kernel: Failed to create system directory fscache Dec 13 14:22:36.275455 kernel: Failed to create system directory fscache Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.276651 kernel: Failed to create system directory fscache Dec 13 14:22:36.276684 kernel: Failed to create system directory fscache Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.277868 kernel: Failed to create system directory fscache Dec 13 14:22:36.277894 kernel: Failed to create system directory fscache Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.279756 kernel: Failed to create system directory fscache Dec 13 14:22:36.279785 kernel: Failed to create system directory fscache Dec 13 14:22:36.279808 kernel: Failed to create system directory fscache Dec 13 14:22:36.233000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.281503 kernel: FS-Cache: Loaded Dec 13 14:22:36.233000 audit[3022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e34f4b99c0 a1=4c0fc a2=55e34ade02b0 a3=5 items=0 ppid=486 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.233000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.309818 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.309858 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.309873 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.311678 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.311714 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.311730 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.312330 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.313511 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.313542 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.314732 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.314757 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.316554 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.316581 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.316596 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.317775 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.317803 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.319618 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.319648 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.319666 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.320862 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.320893 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.322714 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.322736 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.322752 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.323378 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.324651 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.324674 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.325298 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.326535 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.326562 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.327799 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.327827 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.328428 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.329658 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.329686 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.330915 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.330948 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.332802 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.332830 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.332849 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.334690 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.334713 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.334729 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.336606 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.336628 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.336643 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.337837 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.337864 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.339712 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.339741 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.339756 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.341590 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.341619 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.341633 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.342849 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.342877 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.344680 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.344708 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.344721 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.346642 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.346668 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.346683 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.347869 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.347904 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.348509 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.349733 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.349771 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.351752 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.351791 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.351814 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.353906 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.353952 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.353973 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.355838 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.355875 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.355897 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.357757 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.357791 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.357821 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.359674 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.359724 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.359744 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.360407 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.361619 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.361671 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.362884 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.362918 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.364323 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.364355 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.365566 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.365603 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.366816 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.366859 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.368698 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.368734 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.368751 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.370671 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.370718 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.370740 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.371329 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.372628 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.372661 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.373918 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.373952 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.374537 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.375823 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.375857 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.377784 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.377818 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.377840 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.379673 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.379709 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.379727 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.380328 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.381579 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.381611 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.382890 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.382915 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.383499 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.384728 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.384755 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.385354 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.386546 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.386580 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.387763 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.387797 kernel: Failed to create system directory sunrpc Dec 13 14:22:36.298000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.398590 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:22:36.398697 kernel: RPC: Registered udp transport module. Dec 13 14:22:36.398724 kernel: RPC: Registered tcp transport module. Dec 13 14:22:36.398746 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:22:36.298000 audit[3022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e34f505ad0 a1=1a7f1c a2=55e34ade02b0 a3=5 items=6 ppid=486 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.298000 audit: CWD cwd="/" Dec 13 14:22:36.298000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:36.298000 audit: PATH item=1 name=(null) inode=35393 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:36.298000 audit: PATH item=2 name=(null) inode=35393 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:36.298000 audit: PATH item=3 name=(null) inode=35394 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:36.298000 audit: PATH item=4 name=(null) inode=35393 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:36.298000 audit: PATH item=5 name=(null) inode=35395 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:36.298000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.428532 kernel: Failed to create system directory nfs Dec 13 14:22:36.428592 kernel: Failed to create system directory nfs Dec 13 14:22:36.428625 kernel: Failed to create system directory nfs Dec 13 14:22:36.428643 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.429649 kernel: Failed to create system directory nfs Dec 13 14:22:36.429675 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.430841 kernel: Failed to create system directory nfs Dec 13 14:22:36.430867 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.432591 kernel: Failed to create system directory nfs Dec 13 14:22:36.432616 kernel: Failed to create system directory nfs Dec 13 14:22:36.432633 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.433760 kernel: Failed to create system directory nfs Dec 13 14:22:36.433789 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.435515 kernel: Failed to create system directory nfs Dec 13 14:22:36.435540 kernel: Failed to create system directory nfs Dec 13 14:22:36.435556 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.436669 kernel: Failed to create system directory nfs Dec 13 14:22:36.436693 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.437820 kernel: Failed to create system directory nfs Dec 13 14:22:36.437844 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.438394 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.439529 kernel: Failed to create system directory nfs Dec 13 14:22:36.439581 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.440694 kernel: Failed to create system directory nfs Dec 13 14:22:36.440743 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.441858 kernel: Failed to create system directory nfs Dec 13 14:22:36.441905 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.443623 kernel: Failed to create system directory nfs Dec 13 14:22:36.443663 kernel: Failed to create system directory nfs Dec 13 14:22:36.443681 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.444781 kernel: Failed to create system directory nfs Dec 13 14:22:36.444821 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.445404 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.446551 kernel: Failed to create system directory nfs Dec 13 14:22:36.446575 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.447699 kernel: Failed to create system directory nfs Dec 13 14:22:36.447724 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.448848 kernel: Failed to create system directory nfs Dec 13 14:22:36.448872 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.449442 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.450578 kernel: Failed to create system directory nfs Dec 13 14:22:36.450599 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.451743 kernel: Failed to create system directory nfs Dec 13 14:22:36.451768 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.453467 kernel: Failed to create system directory nfs Dec 13 14:22:36.453492 kernel: Failed to create system directory nfs Dec 13 14:22:36.453505 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.454646 kernel: Failed to create system directory nfs Dec 13 14:22:36.454671 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.455808 kernel: Failed to create system directory nfs Dec 13 14:22:36.455832 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.457530 kernel: Failed to create system directory nfs Dec 13 14:22:36.457554 kernel: Failed to create system directory nfs Dec 13 14:22:36.457570 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.458670 kernel: Failed to create system directory nfs Dec 13 14:22:36.458694 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.459824 kernel: Failed to create system directory nfs Dec 13 14:22:36.459845 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.421000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.461561 kernel: Failed to create system directory nfs Dec 13 14:22:36.461668 kernel: Failed to create system directory nfs Dec 13 14:22:36.421000 audit[3022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e34f726700 a1=16e97c a2=55e34ade02b0 a3=5 items=0 ppid=486 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.421000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:22:36.477298 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:22:36.479468 kubelet[1617]: E1213 14:22:36.479456 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.518706 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.518737 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.518752 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.518764 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.520490 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.520517 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.520533 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.521678 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.521703 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.522855 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.522879 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.524629 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.524651 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.524666 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.525808 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.525845 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.527577 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.527598 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.527613 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.528771 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.528792 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.530537 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.530565 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.530580 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.531711 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.531779 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.533481 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.533505 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.533524 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.534662 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.534687 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.535835 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.535863 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.537594 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.537624 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.537638 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.538764 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.538790 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.540528 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.540567 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.540588 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.541713 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.541753 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.543477 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.543510 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.543527 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.544666 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.544686 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.546590 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.546625 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.546646 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.547779 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.547813 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.549536 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.549570 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.549585 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.550724 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.550746 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.552506 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.552539 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.552572 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.553674 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.553705 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.554852 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.554880 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.556617 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.556658 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.556675 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.557801 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.557826 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.559562 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.559617 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.559634 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.560739 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.560772 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.562518 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.562554 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.562576 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.563694 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.563725 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.564865 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.564920 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.565498 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.566659 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.566696 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.567834 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.567863 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.569605 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.569633 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.569650 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.570811 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.570833 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.507000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.572551 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.572607 kernel: Failed to create system directory nfs4 Dec 13 14:22:36.665798 kernel: NFS: Registering the id_resolver key type Dec 13 14:22:36.665884 kernel: Key type id_resolver registered Dec 13 14:22:36.665906 kernel: Key type id_legacy registered Dec 13 14:22:36.507000 audit[3027]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5985a46010 a1=208de4 a2=55b476f9e2b0 a3=5 items=0 ppid=486 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.507000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.687908 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.687950 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.687965 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.689795 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.689819 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.689856 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.691785 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.691814 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.691828 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.693655 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.693680 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.693694 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.694915 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.694936 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.696784 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.696809 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.696824 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.698616 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.698641 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.698655 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.699846 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.699871 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.701694 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.701720 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.701739 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.684000 audit[3028]: AVC avc: denied { confidentiality } for pid=3028 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:36.702919 kernel: Failed to create system directory rpcgss Dec 13 14:22:36.684000 audit[3028]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f0af4ad8010 a1=70af4 a2=55704a8ce2b0 a3=5 items=0 ppid=486 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.684000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:22:36.773275 nfsidmap[3037]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:22:36.775921 nfsidmap[3038]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:22:36.784000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:22:36.784000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:22:36.784000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:22:36.784000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:22:36.784000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ee79b8da90 a2=10 a3=9e8607000d005482 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.784000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:22:36.784000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:22:36.784000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ee79b8da90 a2=10 a3=9e8607000d005482 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.784000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:22:36.784000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:22:36.784000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ee79b8da90 a2=10 a3=9e8607000d005482 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.784000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:22:36.798432 env[1271]: time="2024-12-13T14:22:36.798404312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:295cc76c-e7fa-4e45-9397-d8438ea921fb,Namespace:default,Attempt:0,}" Dec 13 14:22:36.882798 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:22:36.882865 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:22:36.881537 systemd-networkd[1059]: cali5ec59c6bf6e: Link UP Dec 13 14:22:36.883122 systemd-networkd[1059]: cali5ec59c6bf6e: Gained carrier Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.832 [INFO][3039] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.135-k8s-test--pod--1-eth0 default 295cc76c-e7fa-4e45-9397-d8438ea921fb 1257 0 2024-12-13 14:22:21 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.135 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.832 [INFO][3039] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.856 [INFO][3050] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" HandleID="k8s-pod-network.6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Workload="10.67.124.135-k8s-test--pod--1-eth0" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.862 [INFO][3050] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" HandleID="k8s-pod-network.6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Workload="10.67.124.135-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027e9c0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.135", "pod":"test-pod-1", "timestamp":"2024-12-13 14:22:36.856309541 +0000 UTC"}, Hostname:"10.67.124.135", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.862 [INFO][3050] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.862 [INFO][3050] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.862 [INFO][3050] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.135' Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.863 [INFO][3050] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" host="10.67.124.135" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.866 [INFO][3050] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.135" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.869 [INFO][3050] ipam/ipam.go 489: Trying affinity for 192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.870 [INFO][3050] ipam/ipam.go 155: Attempting to load block cidr=192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.872 [INFO][3050] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.53.128/26 host="10.67.124.135" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.872 [INFO][3050] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.53.128/26 handle="k8s-pod-network.6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" host="10.67.124.135" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.873 [INFO][3050] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2 Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.875 [INFO][3050] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.53.128/26 handle="k8s-pod-network.6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" host="10.67.124.135" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.878 [INFO][3050] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.53.132/26] block=192.168.53.128/26 handle="k8s-pod-network.6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" host="10.67.124.135" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.878 [INFO][3050] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.53.132/26] handle="k8s-pod-network.6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" host="10.67.124.135" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.878 [INFO][3050] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.878 [INFO][3050] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.132/26] IPv6=[] ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" HandleID="k8s-pod-network.6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Workload="10.67.124.135-k8s-test--pod--1-eth0" Dec 13 14:22:36.891005 env[1271]: 2024-12-13 14:22:36.879 [INFO][3039] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"295cc76c-e7fa-4e45-9397-d8438ea921fb", ResourceVersion:"1257", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:36.891560 env[1271]: 2024-12-13 14:22:36.879 [INFO][3039] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.53.132/32] ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Dec 13 14:22:36.891560 env[1271]: 2024-12-13 14:22:36.879 [INFO][3039] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Dec 13 14:22:36.891560 env[1271]: 2024-12-13 14:22:36.884 [INFO][3039] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Dec 13 14:22:36.891560 env[1271]: 2024-12-13 14:22:36.884 [INFO][3039] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.135-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"295cc76c-e7fa-4e45-9397-d8438ea921fb", ResourceVersion:"1257", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.135", ContainerID:"6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0a:52:16:a6:28:c6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:36.891560 env[1271]: 2024-12-13 14:22:36.889 [INFO][3039] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.135-k8s-test--pod--1-eth0" Dec 13 14:22:36.943158 env[1271]: time="2024-12-13T14:22:36.943109080Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:36.943710 env[1271]: time="2024-12-13T14:22:36.943140974Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:36.943710 env[1271]: time="2024-12-13T14:22:36.943149732Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:36.943710 env[1271]: time="2024-12-13T14:22:36.943250493Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2 pid=3074 runtime=io.containerd.runc.v2 Dec 13 14:22:36.950116 systemd[1]: Started cri-containerd-6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2.scope. Dec 13 14:22:36.960000 audit[3102]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:36.960000 audit[3102]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe722fd1d0 a2=0 a3=7ffe722fd1bc items=0 ppid=2290 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.960000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit: BPF prog-id=123 op=LOAD Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3074 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356636376366623465633664386530653464396234373164643633 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3074 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356636376366623465633664386530653464396234373164643633 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit: BPF prog-id=124 op=LOAD Dec 13 14:22:36.962000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00030a520 items=0 ppid=3074 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356636376366623465633664386530653464396234373164643633 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit: BPF prog-id=125 op=LOAD Dec 13 14:22:36.962000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00030a568 items=0 ppid=3074 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356636376366623465633664386530653464396234373164643633 Dec 13 14:22:36.962000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:22:36.962000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.962000 audit: BPF prog-id=126 op=LOAD Dec 13 14:22:36.962000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00030a978 items=0 ppid=3074 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356636376366623465633664386530653464396234373164643633 Dec 13 14:22:36.964568 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:22:36.984648 env[1271]: time="2024-12-13T14:22:36.984625507Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:295cc76c-e7fa-4e45-9397-d8438ea921fb,Namespace:default,Attempt:0,} returns sandbox id \"6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2\"" Dec 13 14:22:36.985900 env[1271]: time="2024-12-13T14:22:36.985853974Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:22:37.480375 kubelet[1617]: E1213 14:22:37.480339 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:37.573584 env[1271]: time="2024-12-13T14:22:37.573554569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:37.575307 env[1271]: time="2024-12-13T14:22:37.575291926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:37.576210 env[1271]: time="2024-12-13T14:22:37.576192795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:37.577816 env[1271]: time="2024-12-13T14:22:37.577803138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:37.578187 env[1271]: time="2024-12-13T14:22:37.578168445Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:22:37.579801 env[1271]: time="2024-12-13T14:22:37.579785972Z" level=info msg="CreateContainer within sandbox \"6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:22:37.591686 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1348154320.mount: Deactivated successfully. Dec 13 14:22:37.596567 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3320005051.mount: Deactivated successfully. Dec 13 14:22:37.599102 env[1271]: time="2024-12-13T14:22:37.599075747Z" level=info msg="CreateContainer within sandbox \"6f5f67cfb4ec6d8e0e4d9b471dd6380f64c69a39b4080d5ab2b6acf853e08be2\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"2ea8eb6ca447c99dd8e614ae058a170a3a97db2041ad5ce04e55bc8088f33cff\"" Dec 13 14:22:37.599772 env[1271]: time="2024-12-13T14:22:37.599745014Z" level=info msg="StartContainer for \"2ea8eb6ca447c99dd8e614ae058a170a3a97db2041ad5ce04e55bc8088f33cff\"" Dec 13 14:22:37.611572 systemd[1]: Started cri-containerd-2ea8eb6ca447c99dd8e614ae058a170a3a97db2041ad5ce04e55bc8088f33cff.scope. Dec 13 14:22:37.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.622000 audit: BPF prog-id=127 op=LOAD Dec 13 14:22:37.622000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.622000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3074 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265613865623663613434376339396464386536313461653035386131 Dec 13 14:22:37.622000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.622000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3074 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265613865623663613434376339396464386536313461653035386131 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit: BPF prog-id=128 op=LOAD Dec 13 14:22:37.623000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002d7d10 items=0 ppid=3074 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265613865623663613434376339396464386536313461653035386131 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.623000 audit: BPF prog-id=129 op=LOAD Dec 13 14:22:37.623000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002d7d58 items=0 ppid=3074 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265613865623663613434376339396464386536313461653035386131 Dec 13 14:22:37.623000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:22:37.623000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.624000 audit: BPF prog-id=130 op=LOAD Dec 13 14:22:37.624000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003c0168 items=0 ppid=3074 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265613865623663613434376339396464386536313461653035386131 Dec 13 14:22:37.632862 env[1271]: time="2024-12-13T14:22:37.632836750Z" level=info msg="StartContainer for \"2ea8eb6ca447c99dd8e614ae058a170a3a97db2041ad5ce04e55bc8088f33cff\" returns successfully" Dec 13 14:22:37.659017 kubelet[1617]: I1213 14:22:37.658804 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.06546416 podStartE2EDuration="16.658792178s" podCreationTimestamp="2024-12-13 14:22:21 +0000 UTC" firstStartedPulling="2024-12-13 14:22:36.985563115 +0000 UTC m=+53.943903648" lastFinishedPulling="2024-12-13 14:22:37.578891129 +0000 UTC m=+54.537231666" observedRunningTime="2024-12-13 14:22:37.658635013 +0000 UTC m=+54.616975549" watchObservedRunningTime="2024-12-13 14:22:37.658792178 +0000 UTC m=+54.617132715" Dec 13 14:22:38.481398 kubelet[1617]: E1213 14:22:38.481369 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:38.500411 systemd-networkd[1059]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:22:39.482058 kubelet[1617]: E1213 14:22:39.482027 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:40.482945 kubelet[1617]: E1213 14:22:40.482923 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"