Dec 13 01:52:31.011098 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 01:52:31.011130 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:52:31.011143 kernel: BIOS-provided physical RAM map: Dec 13 01:52:31.011153 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:52:31.011162 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Dec 13 01:52:31.011172 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Dec 13 01:52:31.011187 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Dec 13 01:52:31.011198 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Dec 13 01:52:31.011207 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Dec 13 01:52:31.011217 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Dec 13 01:52:31.011227 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Dec 13 01:52:31.011238 kernel: printk: bootconsole [earlyser0] enabled Dec 13 01:52:31.011248 kernel: NX (Execute Disable) protection: active Dec 13 01:52:31.011258 kernel: efi: EFI v2.70 by Microsoft Dec 13 01:52:31.011275 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c7a98 RNG=0x3ffd1018 Dec 13 01:52:31.011286 kernel: random: crng init done Dec 13 01:52:31.011298 kernel: SMBIOS 3.1.0 present. Dec 13 01:52:31.011310 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Dec 13 01:52:31.011320 kernel: Hypervisor detected: Microsoft Hyper-V Dec 13 01:52:31.011332 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Dec 13 01:52:31.011343 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Dec 13 01:52:31.011354 kernel: Hyper-V: Nested features: 0x1e0101 Dec 13 01:52:31.011367 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Dec 13 01:52:31.011378 kernel: Hyper-V: Using hypercall for remote TLB flush Dec 13 01:52:31.011390 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Dec 13 01:52:31.011401 kernel: tsc: Marking TSC unstable due to running on Hyper-V Dec 13 01:52:31.011412 kernel: tsc: Detected 2593.906 MHz processor Dec 13 01:52:31.011424 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 01:52:31.011437 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 01:52:31.011448 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Dec 13 01:52:31.011459 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 01:52:31.011471 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Dec 13 01:52:31.011485 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Dec 13 01:52:31.011497 kernel: Using GB pages for direct mapping Dec 13 01:52:31.011509 kernel: Secure boot disabled Dec 13 01:52:31.011520 kernel: ACPI: Early table checksum verification disabled Dec 13 01:52:31.011530 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Dec 13 01:52:31.011542 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:52:31.011553 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:52:31.011565 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Dec 13 01:52:31.011584 kernel: ACPI: FACS 0x000000003FFFE000 000040 Dec 13 01:52:31.011597 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:52:31.011609 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:52:31.011622 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:52:31.011634 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:52:31.011647 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:52:31.011662 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:52:31.011674 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:52:31.011686 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Dec 13 01:52:31.011698 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Dec 13 01:52:31.011710 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Dec 13 01:52:31.011723 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Dec 13 01:52:31.011734 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Dec 13 01:52:31.016802 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Dec 13 01:52:31.016823 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Dec 13 01:52:31.016836 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Dec 13 01:52:31.016850 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Dec 13 01:52:31.016863 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Dec 13 01:52:31.016877 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 01:52:31.016891 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 01:52:31.016905 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Dec 13 01:52:31.016920 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Dec 13 01:52:31.016934 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Dec 13 01:52:31.016952 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Dec 13 01:52:31.016966 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Dec 13 01:52:31.016981 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Dec 13 01:52:31.016995 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Dec 13 01:52:31.017009 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Dec 13 01:52:31.017022 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Dec 13 01:52:31.017036 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Dec 13 01:52:31.017050 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Dec 13 01:52:31.017064 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Dec 13 01:52:31.017082 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Dec 13 01:52:31.017097 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Dec 13 01:52:31.017110 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Dec 13 01:52:31.017124 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Dec 13 01:52:31.017139 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Dec 13 01:52:31.017153 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Dec 13 01:52:31.017168 kernel: Zone ranges: Dec 13 01:52:31.017181 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 01:52:31.017195 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 01:52:31.017214 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 01:52:31.017228 kernel: Movable zone start for each node Dec 13 01:52:31.017239 kernel: Early memory node ranges Dec 13 01:52:31.017250 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 01:52:31.017260 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Dec 13 01:52:31.017271 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Dec 13 01:52:31.017282 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 01:52:31.017292 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Dec 13 01:52:31.017301 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:52:31.017314 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 01:52:31.017322 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Dec 13 01:52:31.017331 kernel: ACPI: PM-Timer IO Port: 0x408 Dec 13 01:52:31.017339 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Dec 13 01:52:31.017345 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Dec 13 01:52:31.017355 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 01:52:31.017362 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 01:52:31.017369 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Dec 13 01:52:31.017379 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 01:52:31.017388 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Dec 13 01:52:31.017397 kernel: Booting paravirtualized kernel on Hyper-V Dec 13 01:52:31.017405 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 01:52:31.017412 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 01:52:31.017421 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 01:52:31.017429 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 01:52:31.017436 kernel: pcpu-alloc: [0] 0 1 Dec 13 01:52:31.017444 kernel: Hyper-V: PV spinlocks enabled Dec 13 01:52:31.017452 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 01:52:31.017461 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Dec 13 01:52:31.017472 kernel: Policy zone: Normal Dec 13 01:52:31.017480 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:52:31.017489 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 01:52:31.017497 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 01:52:31.017504 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 01:52:31.017512 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 01:52:31.017521 kernel: Memory: 8079088K/8387460K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 308112K reserved, 0K cma-reserved) Dec 13 01:52:31.017534 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 01:52:31.017543 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 01:52:31.017559 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 01:52:31.017570 kernel: rcu: Hierarchical RCU implementation. Dec 13 01:52:31.017578 kernel: rcu: RCU event tracing is enabled. Dec 13 01:52:31.017588 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 01:52:31.017596 kernel: Rude variant of Tasks RCU enabled. Dec 13 01:52:31.017605 kernel: Tracing variant of Tasks RCU enabled. Dec 13 01:52:31.017614 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 01:52:31.017621 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 01:52:31.017632 kernel: Using NULL legacy PIC Dec 13 01:52:31.017641 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Dec 13 01:52:31.017650 kernel: Console: colour dummy device 80x25 Dec 13 01:52:31.017659 kernel: printk: console [tty1] enabled Dec 13 01:52:31.017666 kernel: printk: console [ttyS0] enabled Dec 13 01:52:31.017677 kernel: printk: bootconsole [earlyser0] disabled Dec 13 01:52:31.017686 kernel: ACPI: Core revision 20210730 Dec 13 01:52:31.017695 kernel: Failed to register legacy timer interrupt Dec 13 01:52:31.017705 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 01:52:31.017713 kernel: Hyper-V: Using IPI hypercalls Dec 13 01:52:31.017723 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Dec 13 01:52:31.017731 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 01:52:31.017755 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 01:52:31.017764 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 01:52:31.017773 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 01:52:31.017782 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 01:52:31.017792 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 01:52:31.017802 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 01:52:31.017810 kernel: RETBleed: Vulnerable Dec 13 01:52:31.017818 kernel: Speculative Store Bypass: Vulnerable Dec 13 01:52:31.017827 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 01:52:31.017834 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 01:52:31.017843 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 01:52:31.017852 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 01:52:31.017859 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 01:52:31.017870 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 01:52:31.017879 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 01:52:31.017887 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 01:52:31.017896 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 01:52:31.017903 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 01:52:31.017912 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 01:52:31.017920 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 01:52:31.017927 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 01:52:31.017938 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Dec 13 01:52:31.017945 kernel: Freeing SMP alternatives memory: 32K Dec 13 01:52:31.017952 kernel: pid_max: default: 32768 minimum: 301 Dec 13 01:52:31.017962 kernel: LSM: Security Framework initializing Dec 13 01:52:31.017969 kernel: SELinux: Initializing. Dec 13 01:52:31.017980 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 01:52:31.017989 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 01:52:31.017996 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 01:52:31.018006 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 01:52:31.018014 kernel: signal: max sigframe size: 3632 Dec 13 01:52:31.018021 kernel: rcu: Hierarchical SRCU implementation. Dec 13 01:52:31.018031 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 01:52:31.018038 kernel: smp: Bringing up secondary CPUs ... Dec 13 01:52:31.018047 kernel: x86: Booting SMP configuration: Dec 13 01:52:31.018056 kernel: .... node #0, CPUs: #1 Dec 13 01:52:31.018065 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Dec 13 01:52:31.018076 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 01:52:31.018084 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 01:52:31.018092 kernel: smpboot: Max logical packages: 1 Dec 13 01:52:31.018101 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Dec 13 01:52:31.018108 kernel: devtmpfs: initialized Dec 13 01:52:31.018117 kernel: x86/mm: Memory block size: 128MB Dec 13 01:52:31.018126 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Dec 13 01:52:31.018138 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 01:52:31.018146 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 01:52:31.018156 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 01:52:31.018164 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 01:52:31.018174 kernel: audit: initializing netlink subsys (disabled) Dec 13 01:52:31.018182 kernel: audit: type=2000 audit(1734054750.024:1): state=initialized audit_enabled=0 res=1 Dec 13 01:52:31.018191 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 01:52:31.018200 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 01:52:31.018207 kernel: cpuidle: using governor menu Dec 13 01:52:31.018221 kernel: ACPI: bus type PCI registered Dec 13 01:52:31.018228 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 01:52:31.018236 kernel: dca service started, version 1.12.1 Dec 13 01:52:31.018246 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 01:52:31.018253 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 01:52:31.018262 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 01:52:31.018271 kernel: ACPI: Added _OSI(Module Device) Dec 13 01:52:31.018278 kernel: ACPI: Added _OSI(Processor Device) Dec 13 01:52:31.018288 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 01:52:31.018298 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 01:52:31.018306 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 01:52:31.018315 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 01:52:31.018322 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 01:52:31.018331 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 01:52:31.018339 kernel: ACPI: Interpreter enabled Dec 13 01:52:31.018347 kernel: ACPI: PM: (supports S0 S5) Dec 13 01:52:31.018357 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 01:52:31.018365 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 01:52:31.018376 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Dec 13 01:52:31.018385 kernel: iommu: Default domain type: Translated Dec 13 01:52:31.018392 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 01:52:31.018401 kernel: vgaarb: loaded Dec 13 01:52:31.018409 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 01:52:31.018417 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 01:52:31.018427 kernel: PTP clock support registered Dec 13 01:52:31.018434 kernel: Registered efivars operations Dec 13 01:52:31.018442 kernel: PCI: Using ACPI for IRQ routing Dec 13 01:52:31.018452 kernel: PCI: System does not support PCI Dec 13 01:52:31.018461 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Dec 13 01:52:31.018471 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 01:52:31.018479 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 01:52:31.018486 kernel: pnp: PnP ACPI init Dec 13 01:52:31.018496 kernel: pnp: PnP ACPI: found 3 devices Dec 13 01:52:31.018503 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 01:52:31.018512 kernel: NET: Registered PF_INET protocol family Dec 13 01:52:31.018521 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 01:52:31.018530 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 01:52:31.018541 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 01:52:31.018549 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 01:52:31.018559 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 01:52:31.018567 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 01:52:31.018577 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 01:52:31.018585 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 01:52:31.018594 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 01:52:31.018603 kernel: NET: Registered PF_XDP protocol family Dec 13 01:52:31.018615 kernel: PCI: CLS 0 bytes, default 64 Dec 13 01:52:31.018623 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 01:52:31.018630 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Dec 13 01:52:31.018641 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 01:52:31.018648 kernel: Initialise system trusted keyrings Dec 13 01:52:31.018656 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 01:52:31.018665 kernel: Key type asymmetric registered Dec 13 01:52:31.018672 kernel: Asymmetric key parser 'x509' registered Dec 13 01:52:31.018681 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 01:52:31.018692 kernel: io scheduler mq-deadline registered Dec 13 01:52:31.018699 kernel: io scheduler kyber registered Dec 13 01:52:31.018709 kernel: io scheduler bfq registered Dec 13 01:52:31.018717 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 01:52:31.018725 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 01:52:31.018734 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 01:52:31.018748 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 01:52:31.018757 kernel: i8042: PNP: No PS/2 controller found. Dec 13 01:52:31.018885 kernel: rtc_cmos 00:02: registered as rtc0 Dec 13 01:52:31.018971 kernel: rtc_cmos 00:02: setting system clock to 2024-12-13T01:52:30 UTC (1734054750) Dec 13 01:52:31.019054 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Dec 13 01:52:31.019066 kernel: fail to initialize ptp_kvm Dec 13 01:52:31.019073 kernel: intel_pstate: CPU model not supported Dec 13 01:52:31.019083 kernel: efifb: probing for efifb Dec 13 01:52:31.019091 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 01:52:31.019099 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 01:52:31.019109 kernel: efifb: scrolling: redraw Dec 13 01:52:31.019120 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 01:52:31.019129 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 01:52:31.019136 kernel: fb0: EFI VGA frame buffer device Dec 13 01:52:31.019143 kernel: pstore: Registered efi as persistent store backend Dec 13 01:52:31.019151 kernel: NET: Registered PF_INET6 protocol family Dec 13 01:52:31.019158 kernel: Segment Routing with IPv6 Dec 13 01:52:31.019165 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 01:52:31.019172 kernel: NET: Registered PF_PACKET protocol family Dec 13 01:52:31.019180 kernel: Key type dns_resolver registered Dec 13 01:52:31.019189 kernel: IPI shorthand broadcast: enabled Dec 13 01:52:31.019196 kernel: sched_clock: Marking stable (816870400, 22107000)->(1045000100, -206022700) Dec 13 01:52:31.019203 kernel: registered taskstats version 1 Dec 13 01:52:31.019210 kernel: Loading compiled-in X.509 certificates Dec 13 01:52:31.019217 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 01:52:31.019224 kernel: Key type .fscrypt registered Dec 13 01:52:31.019232 kernel: Key type fscrypt-provisioning registered Dec 13 01:52:31.019244 kernel: pstore: Using crash dump compression: deflate Dec 13 01:52:31.019254 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 01:52:31.019265 kernel: ima: Allocated hash algorithm: sha1 Dec 13 01:52:31.019274 kernel: ima: No architecture policies found Dec 13 01:52:31.019281 kernel: clk: Disabling unused clocks Dec 13 01:52:31.019288 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 01:52:31.019296 kernel: Write protecting the kernel read-only data: 28672k Dec 13 01:52:31.019304 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 01:52:31.019315 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 01:52:31.019323 kernel: Run /init as init process Dec 13 01:52:31.019330 kernel: with arguments: Dec 13 01:52:31.019339 kernel: /init Dec 13 01:52:31.019350 kernel: with environment: Dec 13 01:52:31.019357 kernel: HOME=/ Dec 13 01:52:31.019364 kernel: TERM=linux Dec 13 01:52:31.019371 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 01:52:31.019380 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:52:31.019389 systemd[1]: Detected virtualization microsoft. Dec 13 01:52:31.019402 systemd[1]: Detected architecture x86-64. Dec 13 01:52:31.019410 systemd[1]: Running in initrd. Dec 13 01:52:31.019417 systemd[1]: No hostname configured, using default hostname. Dec 13 01:52:31.019426 systemd[1]: Hostname set to . Dec 13 01:52:31.019436 systemd[1]: Initializing machine ID from random generator. Dec 13 01:52:31.019444 systemd[1]: Queued start job for default target initrd.target. Dec 13 01:52:31.019454 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:52:31.019463 systemd[1]: Reached target cryptsetup.target. Dec 13 01:52:31.019472 systemd[1]: Reached target paths.target. Dec 13 01:52:31.019484 systemd[1]: Reached target slices.target. Dec 13 01:52:31.019494 systemd[1]: Reached target swap.target. Dec 13 01:52:31.019503 systemd[1]: Reached target timers.target. Dec 13 01:52:31.019512 systemd[1]: Listening on iscsid.socket. Dec 13 01:52:31.019524 systemd[1]: Listening on iscsiuio.socket. Dec 13 01:52:31.019532 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:52:31.019544 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:52:31.019556 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:52:31.019568 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:52:31.019580 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:52:31.019592 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:52:31.019605 systemd[1]: Reached target sockets.target. Dec 13 01:52:31.019617 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:52:31.019629 systemd[1]: Finished network-cleanup.service. Dec 13 01:52:31.019641 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 01:52:31.019651 systemd[1]: Starting systemd-journald.service... Dec 13 01:52:31.019664 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:52:31.019672 systemd[1]: Starting systemd-resolved.service... Dec 13 01:52:31.019683 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 01:52:31.019692 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:52:31.019701 kernel: audit: type=1130 audit(1734054751.018:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.019716 systemd-journald[183]: Journal started Dec 13 01:52:31.019777 systemd-journald[183]: Runtime Journal (/run/log/journal/ba7c8b5ee0ec4bbeb937624a5468bcd2) is 8.0M, max 159.0M, 151.0M free. Dec 13 01:52:31.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.034073 systemd[1]: Started systemd-journald.service. Dec 13 01:52:31.034078 systemd-modules-load[184]: Inserted module 'overlay' Dec 13 01:52:31.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.059012 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 01:52:31.061254 kernel: audit: type=1130 audit(1734054751.045:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.064198 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 01:52:31.069991 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 01:52:31.074813 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:52:31.078870 systemd-resolved[185]: Positive Trust Anchors: Dec 13 01:52:31.078887 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:52:31.078921 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:52:31.081614 systemd-resolved[185]: Defaulting to hostname 'linux'. Dec 13 01:52:31.111531 systemd[1]: Started systemd-resolved.service. Dec 13 01:52:31.128791 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 01:52:31.128822 kernel: audit: type=1130 audit(1734054751.063:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.132442 systemd[1]: Reached target nss-lookup.target. Dec 13 01:52:31.138148 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:52:31.163051 kernel: Bridge firewalling registered Dec 13 01:52:31.163079 kernel: audit: type=1130 audit(1734054751.068:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.152815 systemd-modules-load[184]: Inserted module 'br_netfilter' Dec 13 01:52:31.155414 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 01:52:31.158577 systemd[1]: Starting dracut-cmdline.service... Dec 13 01:52:31.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.182856 dracut-cmdline[200]: dracut-dracut-053 Dec 13 01:52:31.184925 kernel: audit: type=1130 audit(1734054751.130:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.184952 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:52:31.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.222561 kernel: audit: type=1130 audit(1734054751.154:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.222605 kernel: audit: type=1130 audit(1734054751.156:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.226773 kernel: SCSI subsystem initialized Dec 13 01:52:31.254100 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 01:52:31.254141 kernel: device-mapper: uevent: version 1.0.3 Dec 13 01:52:31.259579 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 01:52:31.263603 systemd-modules-load[184]: Inserted module 'dm_multipath' Dec 13 01:52:31.264365 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:52:31.271988 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:52:31.291804 kernel: audit: type=1130 audit(1734054751.268:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.291828 kernel: Loading iSCSI transport class v2.0-870. Dec 13 01:52:31.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.293097 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:52:31.308597 kernel: audit: type=1130 audit(1734054751.294:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.323757 kernel: iscsi: registered transport (tcp) Dec 13 01:52:31.350988 kernel: iscsi: registered transport (qla4xxx) Dec 13 01:52:31.351035 kernel: QLogic iSCSI HBA Driver Dec 13 01:52:31.380094 systemd[1]: Finished dracut-cmdline.service. Dec 13 01:52:31.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.385480 systemd[1]: Starting dracut-pre-udev.service... Dec 13 01:52:31.435765 kernel: raid6: avx512x4 gen() 18541 MB/s Dec 13 01:52:31.455752 kernel: raid6: avx512x4 xor() 7820 MB/s Dec 13 01:52:31.475751 kernel: raid6: avx512x2 gen() 18537 MB/s Dec 13 01:52:31.496752 kernel: raid6: avx512x2 xor() 30033 MB/s Dec 13 01:52:31.516751 kernel: raid6: avx512x1 gen() 18590 MB/s Dec 13 01:52:31.536752 kernel: raid6: avx512x1 xor() 26944 MB/s Dec 13 01:52:31.557754 kernel: raid6: avx2x4 gen() 18436 MB/s Dec 13 01:52:31.577749 kernel: raid6: avx2x4 xor() 7891 MB/s Dec 13 01:52:31.597748 kernel: raid6: avx2x2 gen() 18483 MB/s Dec 13 01:52:31.618752 kernel: raid6: avx2x2 xor() 22188 MB/s Dec 13 01:52:31.638748 kernel: raid6: avx2x1 gen() 14091 MB/s Dec 13 01:52:31.658748 kernel: raid6: avx2x1 xor() 19507 MB/s Dec 13 01:52:31.679750 kernel: raid6: sse2x4 gen() 11720 MB/s Dec 13 01:52:31.699749 kernel: raid6: sse2x4 xor() 7386 MB/s Dec 13 01:52:31.719748 kernel: raid6: sse2x2 gen() 12988 MB/s Dec 13 01:52:31.740750 kernel: raid6: sse2x2 xor() 7504 MB/s Dec 13 01:52:31.760748 kernel: raid6: sse2x1 gen() 11676 MB/s Dec 13 01:52:31.783408 kernel: raid6: sse2x1 xor() 5924 MB/s Dec 13 01:52:31.783435 kernel: raid6: using algorithm avx512x1 gen() 18590 MB/s Dec 13 01:52:31.783447 kernel: raid6: .... xor() 26944 MB/s, rmw enabled Dec 13 01:52:31.786787 kernel: raid6: using avx512x2 recovery algorithm Dec 13 01:52:31.806764 kernel: xor: automatically using best checksumming function avx Dec 13 01:52:31.902766 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 01:52:31.910658 systemd[1]: Finished dracut-pre-udev.service. Dec 13 01:52:31.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.914000 audit: BPF prog-id=7 op=LOAD Dec 13 01:52:31.914000 audit: BPF prog-id=8 op=LOAD Dec 13 01:52:31.915840 systemd[1]: Starting systemd-udevd.service... Dec 13 01:52:31.930713 systemd-udevd[384]: Using default interface naming scheme 'v252'. Dec 13 01:52:31.935242 systemd[1]: Started systemd-udevd.service. Dec 13 01:52:31.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.943290 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 01:52:31.959019 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation Dec 13 01:52:31.988633 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 01:52:31.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:31.993678 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:52:32.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:32.028468 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:52:32.079763 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 01:52:32.085766 kernel: hv_vmbus: Vmbus version:5.2 Dec 13 01:52:32.095757 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 01:52:32.114754 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 01:52:32.114798 kernel: AES CTR mode by8 optimization enabled Dec 13 01:52:32.119758 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 01:52:32.137075 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 01:52:32.139780 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 01:52:32.139822 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 01:52:32.139841 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 01:52:32.148154 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 01:52:32.169390 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 01:52:32.169421 kernel: scsi host1: storvsc_host_t Dec 13 01:52:32.171924 kernel: scsi host0: storvsc_host_t Dec 13 01:52:32.186754 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 01:52:32.194759 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 01:52:32.223951 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 01:52:32.242029 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 01:52:32.242051 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 01:52:32.250655 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 01:52:32.250847 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 01:52:32.251010 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 01:52:32.251171 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 01:52:32.251342 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 01:52:32.251510 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:52:32.251529 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 01:52:32.330342 kernel: hv_netvsc 6045bddf-b632-6045-bddf-b6326045bddf eth0: VF slot 1 added Dec 13 01:52:32.340770 kernel: hv_vmbus: registering driver hv_pci Dec 13 01:52:32.348551 kernel: hv_pci eee316cb-ec3f-48e1-97b0-f06f3d083758: PCI VMBus probing: Using version 0x10004 Dec 13 01:52:32.419141 kernel: hv_pci eee316cb-ec3f-48e1-97b0-f06f3d083758: PCI host bridge to bus ec3f:00 Dec 13 01:52:32.419259 kernel: pci_bus ec3f:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Dec 13 01:52:32.419362 kernel: pci_bus ec3f:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 01:52:32.419448 kernel: pci ec3f:00:02.0: [15b3:1016] type 00 class 0x020000 Dec 13 01:52:32.419554 kernel: pci ec3f:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 01:52:32.419646 kernel: pci ec3f:00:02.0: enabling Extended Tags Dec 13 01:52:32.419750 kernel: pci ec3f:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at ec3f:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Dec 13 01:52:32.419910 kernel: pci_bus ec3f:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 01:52:32.420051 kernel: pci ec3f:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 01:52:32.512760 kernel: mlx5_core ec3f:00:02.0: firmware version: 14.30.5000 Dec 13 01:52:32.767663 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (438) Dec 13 01:52:32.767691 kernel: mlx5_core ec3f:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 01:52:32.767893 kernel: mlx5_core ec3f:00:02.0: Supported tc offload range - chains: 1, prios: 1 Dec 13 01:52:32.768063 kernel: mlx5_core ec3f:00:02.0: mlx5e_tc_post_act_init:40:(pid 188): firmware level support is missing Dec 13 01:52:32.768227 kernel: hv_netvsc 6045bddf-b632-6045-bddf-b6326045bddf eth0: VF registering: eth1 Dec 13 01:52:32.768381 kernel: mlx5_core ec3f:00:02.0 eth1: joined to eth0 Dec 13 01:52:32.617360 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 01:52:32.681156 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:52:32.777949 kernel: mlx5_core ec3f:00:02.0 enP60479s1: renamed from eth1 Dec 13 01:52:32.838826 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 01:52:32.845373 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 01:52:32.851350 systemd[1]: Starting disk-uuid.service... Dec 13 01:52:32.861661 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 01:52:33.881765 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:52:33.882321 disk-uuid[558]: The operation has completed successfully. Dec 13 01:52:33.945309 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 01:52:33.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:33.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:33.945423 systemd[1]: Finished disk-uuid.service. Dec 13 01:52:33.960706 systemd[1]: Starting verity-setup.service... Dec 13 01:52:34.000756 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 01:52:34.286361 systemd[1]: Found device dev-mapper-usr.device. Dec 13 01:52:34.290662 systemd[1]: Mounting sysusr-usr.mount... Dec 13 01:52:34.298260 systemd[1]: Finished verity-setup.service. Dec 13 01:52:34.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:34.371783 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 01:52:34.371819 systemd[1]: Mounted sysusr-usr.mount. Dec 13 01:52:34.375407 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 01:52:34.379511 systemd[1]: Starting ignition-setup.service... Dec 13 01:52:34.384735 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 01:52:34.399568 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:52:34.399600 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:52:34.399617 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:52:34.454306 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 01:52:34.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:34.458000 audit: BPF prog-id=9 op=LOAD Dec 13 01:52:34.459068 systemd[1]: Starting systemd-networkd.service... Dec 13 01:52:34.483003 systemd-networkd[826]: lo: Link UP Dec 13 01:52:34.483013 systemd-networkd[826]: lo: Gained carrier Dec 13 01:52:34.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:34.483919 systemd-networkd[826]: Enumeration completed Dec 13 01:52:34.485081 systemd-networkd[826]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:52:34.485809 systemd[1]: Started systemd-networkd.service. Dec 13 01:52:34.488982 systemd[1]: Reached target network.target. Dec 13 01:52:34.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:34.496558 systemd[1]: Starting iscsiuio.service... Dec 13 01:52:34.505151 systemd[1]: Started iscsiuio.service. Dec 13 01:52:34.510695 systemd[1]: Starting iscsid.service... Dec 13 01:52:34.521762 iscsid[835]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:52:34.521762 iscsid[835]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 01:52:34.521762 iscsid[835]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 01:52:34.521762 iscsid[835]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 01:52:34.521762 iscsid[835]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:52:34.521762 iscsid[835]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 01:52:34.522954 systemd[1]: Started iscsid.service. Dec 13 01:52:34.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:34.553519 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 01:52:34.556412 systemd[1]: Starting dracut-initqueue.service... Dec 13 01:52:34.567281 systemd[1]: Finished dracut-initqueue.service. Dec 13 01:52:34.571982 kernel: mlx5_core ec3f:00:02.0 enP60479s1: Link up Dec 13 01:52:34.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:34.572137 systemd[1]: Reached target remote-fs-pre.target. Dec 13 01:52:34.576212 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:52:34.580404 systemd[1]: Reached target remote-fs.target. Dec 13 01:52:34.585012 systemd[1]: Starting dracut-pre-mount.service... Dec 13 01:52:34.593061 systemd[1]: Finished dracut-pre-mount.service. Dec 13 01:52:34.605201 kernel: hv_netvsc 6045bddf-b632-6045-bddf-b6326045bddf eth0: Data path switched to VF: enP60479s1 Dec 13 01:52:34.605382 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:52:34.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:34.605538 systemd-networkd[826]: enP60479s1: Link UP Dec 13 01:52:34.605658 systemd-networkd[826]: eth0: Link UP Dec 13 01:52:34.605836 systemd-networkd[826]: eth0: Gained carrier Dec 13 01:52:34.609817 systemd-networkd[826]: enP60479s1: Gained carrier Dec 13 01:52:34.623877 systemd-networkd[826]: eth0: DHCPv4 address 10.200.8.19/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:52:34.745456 systemd[1]: Finished ignition-setup.service. Dec 13 01:52:34.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:34.748934 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 01:52:36.310924 systemd-networkd[826]: eth0: Gained IPv6LL Dec 13 01:52:38.233361 ignition[853]: Ignition 2.14.0 Dec 13 01:52:38.233377 ignition[853]: Stage: fetch-offline Dec 13 01:52:38.233465 ignition[853]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:52:38.233513 ignition[853]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:52:38.269812 ignition[853]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:52:38.344584 ignition[853]: parsed url from cmdline: "" Dec 13 01:52:38.344671 ignition[853]: no config URL provided Dec 13 01:52:38.344682 ignition[853]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:52:38.344699 ignition[853]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:52:38.344706 ignition[853]: failed to fetch config: resource requires networking Dec 13 01:52:38.344862 ignition[853]: Ignition finished successfully Dec 13 01:52:38.356721 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 01:52:38.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.360079 systemd[1]: Starting ignition-fetch.service... Dec 13 01:52:38.386060 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 01:52:38.386088 kernel: audit: type=1130 audit(1734054758.358:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.388408 ignition[859]: Ignition 2.14.0 Dec 13 01:52:38.388417 ignition[859]: Stage: fetch Dec 13 01:52:38.388552 ignition[859]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:52:38.388583 ignition[859]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:52:38.394169 ignition[859]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:52:38.394354 ignition[859]: parsed url from cmdline: "" Dec 13 01:52:38.394358 ignition[859]: no config URL provided Dec 13 01:52:38.394366 ignition[859]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:52:38.394374 ignition[859]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:52:38.394407 ignition[859]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 01:52:38.484142 ignition[859]: GET result: OK Dec 13 01:52:38.484311 ignition[859]: config has been read from IMDS userdata Dec 13 01:52:38.484383 ignition[859]: parsing config with SHA512: e103dbda82582f0d46581796ceb125a731b98e28331161501bbf032b179b1592ac153b1110a6978cc950e9fcd411e61a0c864df8e8caabdfe2516d5177caa3b8 Dec 13 01:52:38.488305 unknown[859]: fetched base config from "system" Dec 13 01:52:38.488868 ignition[859]: fetch: fetch complete Dec 13 01:52:38.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.488314 unknown[859]: fetched base config from "system" Dec 13 01:52:38.512341 kernel: audit: type=1130 audit(1734054758.493:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.488876 ignition[859]: fetch: fetch passed Dec 13 01:52:38.488323 unknown[859]: fetched user config from "azure" Dec 13 01:52:38.488940 ignition[859]: Ignition finished successfully Dec 13 01:52:38.490598 systemd[1]: Finished ignition-fetch.service. Dec 13 01:52:38.526684 ignition[865]: Ignition 2.14.0 Dec 13 01:52:38.517538 systemd[1]: Starting ignition-kargs.service... Dec 13 01:52:38.526692 ignition[865]: Stage: kargs Dec 13 01:52:38.526823 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:52:38.526851 ignition[865]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:52:38.529634 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:52:38.536220 ignition[865]: kargs: kargs passed Dec 13 01:52:38.538549 systemd[1]: Finished ignition-kargs.service. Dec 13 01:52:38.554760 kernel: audit: type=1130 audit(1734054758.541:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.536259 ignition[865]: Ignition finished successfully Dec 13 01:52:38.554830 systemd[1]: Starting ignition-disks.service... Dec 13 01:52:38.564196 ignition[871]: Ignition 2.14.0 Dec 13 01:52:38.564205 ignition[871]: Stage: disks Dec 13 01:52:38.564335 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:52:38.564369 ignition[871]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:52:38.569937 systemd[1]: Finished ignition-disks.service. Dec 13 01:52:38.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.567779 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:52:38.594816 kernel: audit: type=1130 audit(1734054758.571:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.572727 systemd[1]: Reached target initrd-root-device.target. Dec 13 01:52:38.569257 ignition[871]: disks: disks passed Dec 13 01:52:38.588267 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:52:38.569317 ignition[871]: Ignition finished successfully Dec 13 01:52:38.592896 systemd[1]: Reached target local-fs.target. Dec 13 01:52:38.594803 systemd[1]: Reached target sysinit.target. Dec 13 01:52:38.596692 systemd[1]: Reached target basic.target. Dec 13 01:52:38.598334 systemd[1]: Starting systemd-fsck-root.service... Dec 13 01:52:38.663322 systemd-fsck[879]: ROOT: clean, 621/7326000 files, 481077/7359488 blocks Dec 13 01:52:38.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.668511 systemd[1]: Finished systemd-fsck-root.service. Dec 13 01:52:38.685488 kernel: audit: type=1130 audit(1734054758.667:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:38.686286 systemd[1]: Mounting sysroot.mount... Dec 13 01:52:38.701756 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 01:52:38.701842 systemd[1]: Mounted sysroot.mount. Dec 13 01:52:38.703845 systemd[1]: Reached target initrd-root-fs.target. Dec 13 01:52:38.736215 systemd[1]: Mounting sysroot-usr.mount... Dec 13 01:52:38.739506 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 01:52:38.744910 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 01:52:38.744951 systemd[1]: Reached target ignition-diskful.target. Dec 13 01:52:38.752486 systemd[1]: Mounted sysroot-usr.mount. Dec 13 01:52:38.802545 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:52:38.804637 systemd[1]: Starting initrd-setup-root.service... Dec 13 01:52:38.822763 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (890) Dec 13 01:52:38.832126 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:52:38.832160 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:52:38.832178 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:52:38.832295 initrd-setup-root[895]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 01:52:38.842472 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:52:38.855431 initrd-setup-root[921]: cut: /sysroot/etc/group: No such file or directory Dec 13 01:52:38.873850 initrd-setup-root[929]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 01:52:38.879444 initrd-setup-root[937]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 01:52:39.412139 systemd[1]: Finished initrd-setup-root.service. Dec 13 01:52:39.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:39.417688 systemd[1]: Starting ignition-mount.service... Dec 13 01:52:39.437495 kernel: audit: type=1130 audit(1734054759.416:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:39.433952 systemd[1]: Starting sysroot-boot.service... Dec 13 01:52:39.438843 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 01:52:39.438965 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 01:52:39.461134 ignition[956]: INFO : Ignition 2.14.0 Dec 13 01:52:39.463425 ignition[956]: INFO : Stage: mount Dec 13 01:52:39.465454 ignition[956]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:52:39.468650 ignition[956]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:52:39.475095 ignition[956]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:52:39.475095 ignition[956]: INFO : mount: mount passed Dec 13 01:52:39.475095 ignition[956]: INFO : Ignition finished successfully Dec 13 01:52:39.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:39.480706 systemd[1]: Finished sysroot-boot.service. Dec 13 01:52:39.499719 kernel: audit: type=1130 audit(1734054759.482:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:39.494844 systemd[1]: Finished ignition-mount.service. Dec 13 01:52:39.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:39.513756 kernel: audit: type=1130 audit(1734054759.499:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:40.230362 coreos-metadata[889]: Dec 13 01:52:40.230 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 01:52:40.247340 coreos-metadata[889]: Dec 13 01:52:40.247 INFO Fetch successful Dec 13 01:52:40.282368 coreos-metadata[889]: Dec 13 01:52:40.282 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 01:52:40.294685 coreos-metadata[889]: Dec 13 01:52:40.294 INFO Fetch successful Dec 13 01:52:40.309866 coreos-metadata[889]: Dec 13 01:52:40.309 INFO wrote hostname ci-3510.3.6-a-39e591e923 to /sysroot/etc/hostname Dec 13 01:52:40.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:40.314891 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 01:52:40.335494 kernel: audit: type=1130 audit(1734054760.317:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:40.319465 systemd[1]: Starting ignition-files.service... Dec 13 01:52:40.338537 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:52:40.352758 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (968) Dec 13 01:52:40.380106 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:52:40.380147 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:52:40.380169 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:52:40.388499 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:52:40.400820 ignition[987]: INFO : Ignition 2.14.0 Dec 13 01:52:40.400820 ignition[987]: INFO : Stage: files Dec 13 01:52:40.404700 ignition[987]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:52:40.404700 ignition[987]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:52:40.417154 ignition[987]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:52:40.436025 ignition[987]: DEBUG : files: compiled without relabeling support, skipping Dec 13 01:52:40.439503 ignition[987]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 01:52:40.439503 ignition[987]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 01:52:40.532701 ignition[987]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 01:52:40.536782 ignition[987]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 01:52:40.536782 ignition[987]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 01:52:40.533340 unknown[987]: wrote ssh authorized keys file for user: core Dec 13 01:52:40.548814 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 01:52:40.553630 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 01:52:40.558061 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:52:40.558061 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:52:40.558061 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 01:52:40.558061 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 01:52:40.558061 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 01:52:40.558061 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 01:52:40.594007 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (989) Dec 13 01:52:40.594027 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3452121295" Dec 13 01:52:40.594027 ignition[987]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3452121295": device or resource busy Dec 13 01:52:40.594027 ignition[987]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3452121295", trying btrfs: device or resource busy Dec 13 01:52:40.594027 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3452121295" Dec 13 01:52:40.594027 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3452121295" Dec 13 01:52:40.622662 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3452121295" Dec 13 01:52:40.627720 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3452121295" Dec 13 01:52:40.627720 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 01:52:40.627720 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 01:52:40.627720 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 01:52:40.646610 systemd[1]: mnt-oem3452121295.mount: Deactivated successfully. Dec 13 01:52:40.654270 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem562878467" Dec 13 01:52:40.654270 ignition[987]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem562878467": device or resource busy Dec 13 01:52:40.654270 ignition[987]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem562878467", trying btrfs: device or resource busy Dec 13 01:52:40.654270 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem562878467" Dec 13 01:52:40.676493 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem562878467" Dec 13 01:52:40.676493 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem562878467" Dec 13 01:52:40.676493 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem562878467" Dec 13 01:52:40.676493 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 01:52:40.676493 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 01:52:40.676493 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 01:52:40.668096 systemd[1]: mnt-oem562878467.mount: Deactivated successfully. Dec 13 01:52:41.101638 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 01:52:41.510879 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 01:52:41.510879 ignition[987]: INFO : files: op(f): [started] processing unit "waagent.service" Dec 13 01:52:41.520650 ignition[987]: INFO : files: op(f): [finished] processing unit "waagent.service" Dec 13 01:52:41.520650 ignition[987]: INFO : files: op(10): [started] processing unit "nvidia.service" Dec 13 01:52:41.520650 ignition[987]: INFO : files: op(10): [finished] processing unit "nvidia.service" Dec 13 01:52:41.520650 ignition[987]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Dec 13 01:52:41.520650 ignition[987]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Dec 13 01:52:41.520650 ignition[987]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Dec 13 01:52:41.520650 ignition[987]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Dec 13 01:52:41.520650 ignition[987]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:52:41.520650 ignition[987]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:52:41.520650 ignition[987]: INFO : files: files passed Dec 13 01:52:41.520650 ignition[987]: INFO : Ignition finished successfully Dec 13 01:52:41.576577 kernel: audit: type=1130 audit(1734054761.541:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.522863 systemd[1]: Finished ignition-files.service. Dec 13 01:52:41.543265 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 01:52:41.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.559802 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 01:52:41.590637 initrd-setup-root-after-ignition[1012]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 01:52:41.564168 systemd[1]: Starting ignition-quench.service... Dec 13 01:52:41.568755 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 01:52:41.568833 systemd[1]: Finished ignition-quench.service. Dec 13 01:52:41.580165 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 01:52:41.583564 systemd[1]: Reached target ignition-complete.target. Dec 13 01:52:41.586349 systemd[1]: Starting initrd-parse-etc.service... Dec 13 01:52:41.618728 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 01:52:41.621295 systemd[1]: Finished initrd-parse-etc.service. Dec 13 01:52:41.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.625311 systemd[1]: Reached target initrd-fs.target. Dec 13 01:52:41.629069 systemd[1]: Reached target initrd.target. Dec 13 01:52:41.632849 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 01:52:41.636620 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 01:52:41.647107 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 01:52:41.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.651939 systemd[1]: Starting initrd-cleanup.service... Dec 13 01:52:41.661512 systemd[1]: Stopped target nss-lookup.target. Dec 13 01:52:41.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.663657 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 01:52:41.664782 systemd[1]: Stopped target timers.target. Dec 13 01:52:41.665160 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 01:52:41.665250 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 01:52:41.666009 systemd[1]: Stopped target initrd.target. Dec 13 01:52:41.682714 systemd[1]: Stopped target basic.target. Dec 13 01:52:41.686564 systemd[1]: Stopped target ignition-complete.target. Dec 13 01:52:41.690887 systemd[1]: Stopped target ignition-diskful.target. Dec 13 01:52:41.695126 systemd[1]: Stopped target initrd-root-device.target. Dec 13 01:52:41.699495 systemd[1]: Stopped target remote-fs.target. Dec 13 01:52:41.703364 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 01:52:41.707644 systemd[1]: Stopped target sysinit.target. Dec 13 01:52:41.711350 systemd[1]: Stopped target local-fs.target. Dec 13 01:52:41.717130 systemd[1]: Stopped target local-fs-pre.target. Dec 13 01:52:41.721209 systemd[1]: Stopped target swap.target. Dec 13 01:52:41.724704 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 01:52:41.727131 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 01:52:41.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.731407 systemd[1]: Stopped target cryptsetup.target. Dec 13 01:52:41.735647 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 01:52:41.738043 systemd[1]: Stopped dracut-initqueue.service. Dec 13 01:52:41.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.742064 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 01:52:41.744886 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 01:52:41.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.750586 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 01:52:41.752929 systemd[1]: Stopped ignition-files.service. Dec 13 01:52:41.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.756853 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 01:52:41.758822 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 01:52:41.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.762936 systemd[1]: Stopping ignition-mount.service... Dec 13 01:52:41.771186 iscsid[835]: iscsid shutting down. Dec 13 01:52:41.773181 ignition[1025]: INFO : Ignition 2.14.0 Dec 13 01:52:41.773181 ignition[1025]: INFO : Stage: umount Dec 13 01:52:41.773181 ignition[1025]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:52:41.773181 ignition[1025]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:52:41.775868 systemd[1]: Stopping iscsid.service... Dec 13 01:52:41.779615 systemd[1]: Stopping sysroot-boot.service... Dec 13 01:52:41.789895 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 01:52:41.790133 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 01:52:41.800157 ignition[1025]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:52:41.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.801611 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 01:52:41.807721 ignition[1025]: INFO : umount: umount passed Dec 13 01:52:41.807721 ignition[1025]: INFO : Ignition finished successfully Dec 13 01:52:41.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.801707 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 01:52:41.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.809186 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 01:52:41.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.809291 systemd[1]: Stopped iscsid.service. Dec 13 01:52:41.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.812152 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 01:52:41.812236 systemd[1]: Stopped ignition-mount.service. Dec 13 01:52:41.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.816971 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 01:52:41.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.817046 systemd[1]: Finished initrd-cleanup.service. Dec 13 01:52:41.822734 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 01:52:41.822830 systemd[1]: Stopped ignition-disks.service. Dec 13 01:52:41.826262 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 01:52:41.826310 systemd[1]: Stopped ignition-kargs.service. Dec 13 01:52:41.830138 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 01:52:41.830184 systemd[1]: Stopped ignition-fetch.service. Dec 13 01:52:41.834598 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 01:52:41.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.834644 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 01:52:41.838705 systemd[1]: Stopped target paths.target. Dec 13 01:52:41.843015 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 01:52:41.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.844805 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 01:52:41.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.847113 systemd[1]: Stopped target slices.target. Dec 13 01:52:41.849581 systemd[1]: Stopped target sockets.target. Dec 13 01:52:41.894000 audit: BPF prog-id=6 op=UNLOAD Dec 13 01:52:41.862109 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 01:52:41.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.862150 systemd[1]: Closed iscsid.socket. Dec 13 01:52:41.865601 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 01:52:41.865652 systemd[1]: Stopped ignition-setup.service. Dec 13 01:52:41.870275 systemd[1]: Stopping iscsiuio.service... Dec 13 01:52:41.877467 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 01:52:41.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.877887 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 01:52:41.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.877984 systemd[1]: Stopped iscsiuio.service. Dec 13 01:52:41.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.880541 systemd[1]: Stopped target network.target. Dec 13 01:52:41.881423 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 01:52:41.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.881455 systemd[1]: Closed iscsiuio.socket. Dec 13 01:52:41.882057 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:52:41.882344 systemd[1]: Stopping systemd-resolved.service... Dec 13 01:52:41.887657 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 01:52:41.887774 systemd[1]: Stopped systemd-resolved.service. Dec 13 01:52:41.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.893764 systemd-networkd[826]: eth0: DHCPv6 lease lost Dec 13 01:52:41.951000 audit: BPF prog-id=9 op=UNLOAD Dec 13 01:52:41.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.895978 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:52:41.896069 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:52:41.901749 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 01:52:41.901790 systemd[1]: Closed systemd-networkd.socket. Dec 13 01:52:41.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.906749 systemd[1]: Stopping network-cleanup.service... Dec 13 01:52:41.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.911653 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 01:52:41.911713 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 01:52:41.990390 kernel: hv_netvsc 6045bddf-b632-6045-bddf-b6326045bddf eth0: Data path switched from VF: enP60479s1 Dec 13 01:52:41.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.916155 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 01:52:41.916206 systemd[1]: Stopped systemd-sysctl.service. Dec 13 01:52:41.921955 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 01:52:41.922003 systemd[1]: Stopped systemd-modules-load.service. Dec 13 01:52:41.924444 systemd[1]: Stopping systemd-udevd.service... Dec 13 01:52:41.930656 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 01:52:41.931192 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 01:52:41.931319 systemd[1]: Stopped systemd-udevd.service. Dec 13 01:52:42.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.936133 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 01:52:41.936180 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 01:52:41.941769 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 01:52:41.941834 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 01:52:41.946123 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 01:52:41.946172 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 01:52:41.948136 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 01:52:41.948173 systemd[1]: Stopped dracut-cmdline.service. Dec 13 01:52:41.952143 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 01:52:41.952191 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 01:52:41.954867 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 01:52:41.965203 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 01:52:41.965290 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 01:52:41.970717 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 01:52:41.970799 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 01:52:41.974829 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 01:52:41.974883 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 01:52:41.978015 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 01:52:41.978490 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 01:52:41.978575 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 01:52:42.007732 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 01:52:42.007844 systemd[1]: Stopped network-cleanup.service. Dec 13 01:52:42.225864 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 01:52:42.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:42.226011 systemd[1]: Stopped sysroot-boot.service. Dec 13 01:52:42.230554 systemd[1]: Reached target initrd-switch-root.target. Dec 13 01:52:42.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:42.238051 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 01:52:42.238126 systemd[1]: Stopped initrd-setup-root.service. Dec 13 01:52:42.243350 systemd[1]: Starting initrd-switch-root.service... Dec 13 01:52:42.256334 systemd[1]: Switching root. Dec 13 01:52:42.282944 systemd-journald[183]: Journal stopped Dec 13 01:52:56.668679 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Dec 13 01:52:56.668727 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 01:52:56.668815 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 01:52:56.668831 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 01:52:56.668845 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 01:52:56.668859 kernel: SELinux: policy capability open_perms=1 Dec 13 01:52:56.668878 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 01:52:56.668893 kernel: SELinux: policy capability always_check_network=0 Dec 13 01:52:56.668907 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 01:52:56.668921 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 01:52:56.668935 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 01:52:56.668949 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 01:52:56.668963 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 01:52:56.668979 kernel: audit: type=1403 audit(1734054764.771:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:52:56.669000 systemd[1]: Successfully loaded SELinux policy in 291.816ms. Dec 13 01:52:56.669017 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 30.966ms. Dec 13 01:52:56.669036 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:52:56.669052 systemd[1]: Detected virtualization microsoft. Dec 13 01:52:56.669071 systemd[1]: Detected architecture x86-64. Dec 13 01:52:56.669086 systemd[1]: Detected first boot. Dec 13 01:52:56.669103 systemd[1]: Hostname set to . Dec 13 01:52:56.669120 systemd[1]: Initializing machine ID from random generator. Dec 13 01:52:56.669136 kernel: audit: type=1400 audit(1734054765.493:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:52:56.669152 kernel: audit: type=1400 audit(1734054765.508:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:52:56.669168 kernel: audit: type=1400 audit(1734054765.508:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:52:56.669186 kernel: audit: type=1334 audit(1734054765.533:86): prog-id=10 op=LOAD Dec 13 01:52:56.669201 kernel: audit: type=1334 audit(1734054765.533:87): prog-id=10 op=UNLOAD Dec 13 01:52:56.669216 kernel: audit: type=1334 audit(1734054765.543:88): prog-id=11 op=LOAD Dec 13 01:52:56.669230 kernel: audit: type=1334 audit(1734054765.543:89): prog-id=11 op=UNLOAD Dec 13 01:52:56.669246 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 01:52:56.669261 kernel: audit: type=1400 audit(1734054767.215:90): avc: denied { associate } for pid=1058 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:52:56.669278 kernel: audit: type=1300 audit(1734054767.215:90): arch=c000003e syscall=188 success=yes exit=0 a0=c000024302 a1=c00002a3d8 a2=c000028840 a3=32 items=0 ppid=1041 pid=1058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:56.669296 systemd[1]: Populated /etc with preset unit settings. Dec 13 01:52:56.669313 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:52:56.669329 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:52:56.669348 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:52:56.669363 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 01:52:56.669378 kernel: audit: type=1334 audit(1734054776.098:92): prog-id=12 op=LOAD Dec 13 01:52:56.669392 kernel: audit: type=1334 audit(1734054776.098:93): prog-id=3 op=UNLOAD Dec 13 01:52:56.669410 kernel: audit: type=1334 audit(1734054776.103:94): prog-id=13 op=LOAD Dec 13 01:52:56.669430 kernel: audit: type=1334 audit(1734054776.116:95): prog-id=14 op=LOAD Dec 13 01:52:56.669445 kernel: audit: type=1334 audit(1734054776.116:96): prog-id=4 op=UNLOAD Dec 13 01:52:56.669462 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 01:52:56.670074 kernel: audit: type=1334 audit(1734054776.116:97): prog-id=5 op=UNLOAD Dec 13 01:52:56.670094 kernel: audit: type=1131 audit(1734054776.118:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.670111 systemd[1]: Stopped initrd-switch-root.service. Dec 13 01:52:56.670127 kernel: audit: type=1334 audit(1734054776.154:99): prog-id=12 op=UNLOAD Dec 13 01:52:56.670145 kernel: audit: type=1130 audit(1734054776.165:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.670160 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 01:52:56.670175 kernel: audit: type=1131 audit(1734054776.166:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.670190 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 01:52:56.670207 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 01:52:56.670222 systemd[1]: Created slice system-getty.slice. Dec 13 01:52:56.670238 systemd[1]: Created slice system-modprobe.slice. Dec 13 01:52:56.670258 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 01:52:56.670274 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 01:52:56.670290 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 01:52:56.670307 systemd[1]: Created slice user.slice. Dec 13 01:52:56.670323 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:52:56.670339 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 01:52:56.670356 systemd[1]: Set up automount boot.automount. Dec 13 01:52:56.670370 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 01:52:56.670385 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 01:52:56.670406 systemd[1]: Stopped target initrd-fs.target. Dec 13 01:52:56.670421 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 01:52:56.670437 systemd[1]: Reached target integritysetup.target. Dec 13 01:52:56.670453 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:52:56.670470 systemd[1]: Reached target remote-fs.target. Dec 13 01:52:56.670485 systemd[1]: Reached target slices.target. Dec 13 01:52:56.670502 systemd[1]: Reached target swap.target. Dec 13 01:52:56.670517 systemd[1]: Reached target torcx.target. Dec 13 01:52:56.670536 systemd[1]: Reached target veritysetup.target. Dec 13 01:52:56.670552 systemd[1]: Listening on systemd-coredump.socket. Dec 13 01:52:56.670567 systemd[1]: Listening on systemd-initctl.socket. Dec 13 01:52:56.670586 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:52:56.670603 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:52:56.670622 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:52:56.670639 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 01:52:56.670655 systemd[1]: Mounting dev-hugepages.mount... Dec 13 01:52:56.670670 systemd[1]: Mounting dev-mqueue.mount... Dec 13 01:52:56.670685 systemd[1]: Mounting media.mount... Dec 13 01:52:56.670701 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:52:56.670717 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 01:52:56.670735 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 01:52:56.671709 systemd[1]: Mounting tmp.mount... Dec 13 01:52:56.671727 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 01:52:56.671750 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:52:56.671763 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:52:56.671774 systemd[1]: Starting modprobe@configfs.service... Dec 13 01:52:56.671785 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:52:56.671796 systemd[1]: Starting modprobe@drm.service... Dec 13 01:52:56.671807 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:52:56.671819 systemd[1]: Starting modprobe@fuse.service... Dec 13 01:52:56.671830 systemd[1]: Starting modprobe@loop.service... Dec 13 01:52:56.671844 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 01:52:56.671857 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 01:52:56.671867 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 01:52:56.671880 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 01:52:56.671890 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 01:52:56.671902 systemd[1]: Stopped systemd-journald.service. Dec 13 01:52:56.671912 systemd[1]: Starting systemd-journald.service... Dec 13 01:52:56.671924 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:52:56.671937 systemd[1]: Starting systemd-network-generator.service... Dec 13 01:52:56.671950 systemd[1]: Starting systemd-remount-fs.service... Dec 13 01:52:56.671960 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:52:56.671971 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 01:52:56.671982 systemd[1]: Stopped verity-setup.service. Dec 13 01:52:56.671994 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:52:56.672005 systemd[1]: Mounted dev-hugepages.mount. Dec 13 01:52:56.672016 systemd[1]: Mounted dev-mqueue.mount. Dec 13 01:52:56.672028 kernel: loop: module loaded Dec 13 01:52:56.672043 systemd[1]: Mounted media.mount. Dec 13 01:52:56.672053 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 01:52:56.672065 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 01:52:56.672075 systemd[1]: Mounted tmp.mount. Dec 13 01:52:56.672087 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:52:56.672097 kernel: fuse: init (API version 7.34) Dec 13 01:52:56.672108 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 01:52:56.672128 systemd[1]: Finished modprobe@configfs.service. Dec 13 01:52:56.672140 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:52:56.672153 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:52:56.672170 systemd-journald[1139]: Journal started Dec 13 01:52:56.672223 systemd-journald[1139]: Runtime Journal (/run/log/journal/2494de8b04314fcfa14e895265454047) is 8.0M, max 159.0M, 151.0M free. Dec 13 01:52:44.771000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:52:45.493000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:52:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:52:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:52:45.533000 audit: BPF prog-id=10 op=LOAD Dec 13 01:52:45.533000 audit: BPF prog-id=10 op=UNLOAD Dec 13 01:52:45.543000 audit: BPF prog-id=11 op=LOAD Dec 13 01:52:45.543000 audit: BPF prog-id=11 op=UNLOAD Dec 13 01:52:47.215000 audit[1058]: AVC avc: denied { associate } for pid=1058 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:52:47.215000 audit[1058]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c000024302 a1=c00002a3d8 a2=c000028840 a3=32 items=0 ppid=1041 pid=1058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:47.215000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:52:47.224000 audit[1058]: AVC avc: denied { associate } for pid=1058 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:52:47.224000 audit[1058]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000243d9 a2=1ed a3=0 items=2 ppid=1041 pid=1058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:47.224000 audit: CWD cwd="/" Dec 13 01:52:47.224000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:47.224000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:47.224000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:52:56.098000 audit: BPF prog-id=12 op=LOAD Dec 13 01:52:56.098000 audit: BPF prog-id=3 op=UNLOAD Dec 13 01:52:56.103000 audit: BPF prog-id=13 op=LOAD Dec 13 01:52:56.116000 audit: BPF prog-id=14 op=LOAD Dec 13 01:52:56.116000 audit: BPF prog-id=4 op=UNLOAD Dec 13 01:52:56.116000 audit: BPF prog-id=5 op=UNLOAD Dec 13 01:52:56.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.154000 audit: BPF prog-id=12 op=UNLOAD Dec 13 01:52:56.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.527000 audit: BPF prog-id=15 op=LOAD Dec 13 01:52:56.527000 audit: BPF prog-id=16 op=LOAD Dec 13 01:52:56.527000 audit: BPF prog-id=17 op=LOAD Dec 13 01:52:56.527000 audit: BPF prog-id=13 op=UNLOAD Dec 13 01:52:56.527000 audit: BPF prog-id=14 op=UNLOAD Dec 13 01:52:56.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.655000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 01:52:56.655000 audit[1139]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffd7d35be0 a2=4000 a3=7fffd7d35c7c items=0 ppid=1 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:56.655000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 01:52:56.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.097630 systemd[1]: Queued start job for default target multi-user.target. Dec 13 01:52:47.164481 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:52:56.118551 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 01:52:47.168667 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:52:47.168691 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:52:47.168736 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 01:52:47.168769 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 01:52:47.168834 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 01:52:47.168851 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 01:52:47.169090 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 01:52:47.169154 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:52:47.169173 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:52:47.200445 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 01:52:47.200506 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 01:52:47.200526 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 01:52:47.200540 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 01:52:47.200564 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 01:52:47.200578 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 01:52:55.058834 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:55Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:52:56.678681 systemd[1]: Started systemd-journald.service. Dec 13 01:52:56.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:55.059070 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:55Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:52:55.059185 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:55Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:52:55.059353 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:55Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:52:55.059399 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:55Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 01:52:55.059455 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-12-13T01:52:55Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 01:52:56.679444 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 01:52:56.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.681691 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:52:56.681868 systemd[1]: Finished modprobe@drm.service. Dec 13 01:52:56.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.684488 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:52:56.684624 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:52:56.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.687294 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 01:52:56.687454 systemd[1]: Finished modprobe@fuse.service. Dec 13 01:52:56.689866 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:52:56.690064 systemd[1]: Finished modprobe@loop.service. Dec 13 01:52:56.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.693968 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:52:56.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.696729 systemd[1]: Finished systemd-network-generator.service. Dec 13 01:52:56.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.699487 systemd[1]: Finished systemd-remount-fs.service. Dec 13 01:52:56.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.702701 systemd[1]: Reached target network-pre.target. Dec 13 01:52:56.706819 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 01:52:56.710303 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 01:52:56.713172 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 01:52:56.731259 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 01:52:56.734606 systemd[1]: Starting systemd-journal-flush.service... Dec 13 01:52:56.736604 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:52:56.737701 systemd[1]: Starting systemd-random-seed.service... Dec 13 01:52:56.739652 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:52:56.740717 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:52:56.743928 systemd[1]: Starting systemd-sysusers.service... Dec 13 01:52:56.748675 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 01:52:56.752459 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 01:52:56.762890 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:52:56.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.766597 systemd[1]: Starting systemd-udev-settle.service... Dec 13 01:52:56.774967 systemd[1]: Finished systemd-random-seed.service. Dec 13 01:52:56.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.777271 systemd[1]: Reached target first-boot-complete.target. Dec 13 01:52:56.782554 udevadm[1181]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 01:52:56.791343 systemd-journald[1139]: Time spent on flushing to /var/log/journal/2494de8b04314fcfa14e895265454047 is 18.919ms for 1141 entries. Dec 13 01:52:56.791343 systemd-journald[1139]: System Journal (/var/log/journal/2494de8b04314fcfa14e895265454047) is 8.0M, max 2.6G, 2.6G free. Dec 13 01:52:56.857337 systemd-journald[1139]: Received client request to flush runtime journal. Dec 13 01:52:56.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.815992 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:52:56.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:56.858308 systemd[1]: Finished systemd-journal-flush.service. Dec 13 01:52:57.412273 systemd[1]: Finished systemd-sysusers.service. Dec 13 01:52:57.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:57.416410 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:52:57.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:57.797008 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:52:58.089559 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 01:52:58.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:58.092000 audit: BPF prog-id=18 op=LOAD Dec 13 01:52:58.092000 audit: BPF prog-id=19 op=LOAD Dec 13 01:52:58.092000 audit: BPF prog-id=7 op=UNLOAD Dec 13 01:52:58.092000 audit: BPF prog-id=8 op=UNLOAD Dec 13 01:52:58.094136 systemd[1]: Starting systemd-udevd.service... Dec 13 01:52:58.111661 systemd-udevd[1186]: Using default interface naming scheme 'v252'. Dec 13 01:52:58.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:58.350000 audit: BPF prog-id=20 op=LOAD Dec 13 01:52:58.346012 systemd[1]: Started systemd-udevd.service. Dec 13 01:52:58.352841 systemd[1]: Starting systemd-networkd.service... Dec 13 01:52:58.387173 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 01:52:58.474000 audit[1187]: AVC avc: denied { confidentiality } for pid=1187 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:52:58.480000 audit: BPF prog-id=21 op=LOAD Dec 13 01:52:58.480000 audit: BPF prog-id=22 op=LOAD Dec 13 01:52:58.480000 audit: BPF prog-id=23 op=LOAD Dec 13 01:52:58.482146 systemd[1]: Starting systemd-userdbd.service... Dec 13 01:52:58.501762 kernel: hv_vmbus: registering driver hv_balloon Dec 13 01:52:58.516754 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 01:52:58.523760 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 01:52:58.524778 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 01:52:58.526754 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 01:52:58.526814 kernel: hv_vmbus: registering driver hv_utils Dec 13 01:52:58.527772 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 01:52:58.527825 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 01:52:58.527850 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 01:52:58.860946 systemd[1]: Started systemd-userdbd.service. Dec 13 01:52:58.474000 audit[1187]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55edb1218740 a1=f884 a2=7f00c8707bc5 a3=5 items=12 ppid=1186 pid=1187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:58.474000 audit: CWD cwd="/" Dec 13 01:52:58.474000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=1 name=(null) inode=15485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=2 name=(null) inode=15485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=3 name=(null) inode=15486 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=4 name=(null) inode=15485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=5 name=(null) inode=15487 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=6 name=(null) inode=15485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=7 name=(null) inode=15488 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=8 name=(null) inode=15485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=9 name=(null) inode=15489 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=10 name=(null) inode=15485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PATH item=11 name=(null) inode=15490 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:52:58.474000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 01:52:58.867149 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 01:52:58.867210 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 01:52:58.982662 kernel: Console: switching to colour dummy device 80x25 Dec 13 01:52:58.991370 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 01:52:58.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:59.017324 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1189) Dec 13 01:52:59.062670 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:52:59.109326 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Dec 13 01:52:59.175048 systemd[1]: Finished systemd-udev-settle.service. Dec 13 01:52:59.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:59.179440 systemd[1]: Starting lvm2-activation-early.service... Dec 13 01:52:59.190007 systemd-networkd[1200]: lo: Link UP Dec 13 01:52:59.190017 systemd-networkd[1200]: lo: Gained carrier Dec 13 01:52:59.190658 systemd-networkd[1200]: Enumeration completed Dec 13 01:52:59.190763 systemd[1]: Started systemd-networkd.service. Dec 13 01:52:59.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:59.194423 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:52:59.216556 systemd-networkd[1200]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:52:59.249363 kernel: mlx5_core ec3f:00:02.0 enP60479s1: Link up Dec 13 01:52:59.270660 kernel: hv_netvsc 6045bddf-b632-6045-bddf-b6326045bddf eth0: Data path switched to VF: enP60479s1 Dec 13 01:52:59.270397 systemd-networkd[1200]: enP60479s1: Link UP Dec 13 01:52:59.270537 systemd-networkd[1200]: eth0: Link UP Dec 13 01:52:59.270543 systemd-networkd[1200]: eth0: Gained carrier Dec 13 01:52:59.276068 systemd-networkd[1200]: enP60479s1: Gained carrier Dec 13 01:52:59.304419 systemd-networkd[1200]: eth0: DHCPv4 address 10.200.8.19/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:52:59.520446 lvm[1262]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:52:59.547435 systemd[1]: Finished lvm2-activation-early.service. Dec 13 01:52:59.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:59.550697 systemd[1]: Reached target cryptsetup.target. Dec 13 01:52:59.554413 systemd[1]: Starting lvm2-activation.service... Dec 13 01:52:59.558954 lvm[1264]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:52:59.584250 systemd[1]: Finished lvm2-activation.service. Dec 13 01:52:59.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:59.586788 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:52:59.589182 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 01:52:59.589219 systemd[1]: Reached target local-fs.target. Dec 13 01:52:59.591416 systemd[1]: Reached target machines.target. Dec 13 01:52:59.594802 systemd[1]: Starting ldconfig.service... Dec 13 01:52:59.596942 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:52:59.597034 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:52:59.598172 systemd[1]: Starting systemd-boot-update.service... Dec 13 01:52:59.601267 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 01:52:59.605256 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 01:52:59.608692 systemd[1]: Starting systemd-sysext.service... Dec 13 01:53:00.082966 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1266 (bootctl) Dec 13 01:53:00.084740 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 01:53:00.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.103794 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 01:53:00.150860 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 01:53:00.188738 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 01:53:00.188991 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 01:53:00.205326 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 01:53:00.239642 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 01:53:00.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.241581 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 01:53:00.247316 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 01:53:00.264325 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 01:53:00.268475 (sd-sysext)[1278]: Using extensions 'kubernetes'. Dec 13 01:53:00.268872 (sd-sysext)[1278]: Merged extensions into '/usr'. Dec 13 01:53:00.284495 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:00.285914 systemd[1]: Mounting usr-share-oem.mount... Dec 13 01:53:00.287495 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:53:00.289107 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:53:00.297412 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:53:00.300532 systemd[1]: Starting modprobe@loop.service... Dec 13 01:53:00.302802 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:53:00.302970 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:00.303128 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:00.305916 systemd[1]: Mounted usr-share-oem.mount. Dec 13 01:53:00.309024 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:53:00.309172 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:53:00.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.312260 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:53:00.312417 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:53:00.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.315671 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:53:00.315804 systemd[1]: Finished modprobe@loop.service. Dec 13 01:53:00.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.318964 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:53:00.319108 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:53:00.320221 systemd[1]: Finished systemd-sysext.service. Dec 13 01:53:00.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.324562 systemd[1]: Starting ensure-sysext.service... Dec 13 01:53:00.328148 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 01:53:00.342666 systemd[1]: Reloading. Dec 13 01:53:00.388481 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 01:53:00.404981 /usr/lib/systemd/system-generators/torcx-generator[1305]: time="2024-12-13T01:53:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:53:00.405400 /usr/lib/systemd/system-generators/torcx-generator[1305]: time="2024-12-13T01:53:00Z" level=info msg="torcx already run" Dec 13 01:53:00.436336 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 01:53:00.451611 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 01:53:00.498173 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:53:00.498192 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:53:00.514911 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:53:00.569659 systemd-networkd[1200]: eth0: Gained IPv6LL Dec 13 01:53:00.580000 audit: BPF prog-id=24 op=LOAD Dec 13 01:53:00.580000 audit: BPF prog-id=15 op=UNLOAD Dec 13 01:53:00.580000 audit: BPF prog-id=25 op=LOAD Dec 13 01:53:00.580000 audit: BPF prog-id=26 op=LOAD Dec 13 01:53:00.580000 audit: BPF prog-id=16 op=UNLOAD Dec 13 01:53:00.580000 audit: BPF prog-id=17 op=UNLOAD Dec 13 01:53:00.581000 audit: BPF prog-id=27 op=LOAD Dec 13 01:53:00.581000 audit: BPF prog-id=20 op=UNLOAD Dec 13 01:53:00.582000 audit: BPF prog-id=28 op=LOAD Dec 13 01:53:00.582000 audit: BPF prog-id=21 op=UNLOAD Dec 13 01:53:00.582000 audit: BPF prog-id=29 op=LOAD Dec 13 01:53:00.582000 audit: BPF prog-id=30 op=LOAD Dec 13 01:53:00.582000 audit: BPF prog-id=22 op=UNLOAD Dec 13 01:53:00.582000 audit: BPF prog-id=23 op=UNLOAD Dec 13 01:53:00.583000 audit: BPF prog-id=31 op=LOAD Dec 13 01:53:00.583000 audit: BPF prog-id=32 op=LOAD Dec 13 01:53:00.583000 audit: BPF prog-id=18 op=UNLOAD Dec 13 01:53:00.583000 audit: BPF prog-id=19 op=UNLOAD Dec 13 01:53:00.588461 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:53:00.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.600400 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:00.600702 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:53:00.602009 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:53:00.604649 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:53:00.608082 systemd[1]: Starting modprobe@loop.service... Dec 13 01:53:00.609355 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:53:00.609559 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:00.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.609749 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:00.611265 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:53:00.611504 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:53:00.617513 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:53:00.617652 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:53:00.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.619148 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:53:00.619250 systemd[1]: Finished modprobe@loop.service. Dec 13 01:53:00.626854 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:00.627122 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:53:00.628619 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:53:00.631692 systemd[1]: Starting modprobe@drm.service... Dec 13 01:53:00.632960 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:53:00.633135 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:00.633292 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:53:00.633459 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:00.636066 systemd[1]: Finished ensure-sysext.service. Dec 13 01:53:00.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.638082 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:53:00.638224 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:53:00.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:00.639232 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:53:00.640090 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:53:00.640194 systemd[1]: Finished modprobe@drm.service. Dec 13 01:53:01.043933 systemd-fsck[1273]: fsck.fat 4.2 (2021-01-31) Dec 13 01:53:01.043933 systemd-fsck[1273]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 01:53:01.046835 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 01:53:01.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.051849 systemd[1]: Mounting boot.mount... Dec 13 01:53:01.066628 systemd[1]: Mounted boot.mount. Dec 13 01:53:01.080727 systemd[1]: Finished systemd-boot-update.service. Dec 13 01:53:01.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.675718 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 01:53:01.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.680594 systemd[1]: Starting audit-rules.service... Dec 13 01:53:01.681918 kernel: kauditd_printk_skb: 109 callbacks suppressed Dec 13 01:53:01.681972 kernel: audit: type=1130 audit(1734054781.677:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.696942 systemd[1]: Starting clean-ca-certificates.service... Dec 13 01:53:01.700898 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 01:53:01.703000 audit: BPF prog-id=33 op=LOAD Dec 13 01:53:01.710040 kernel: audit: type=1334 audit(1734054781.703:195): prog-id=33 op=LOAD Dec 13 01:53:01.708500 systemd[1]: Starting systemd-resolved.service... Dec 13 01:53:01.710000 audit: BPF prog-id=34 op=LOAD Dec 13 01:53:01.716350 kernel: audit: type=1334 audit(1734054781.710:196): prog-id=34 op=LOAD Dec 13 01:53:01.716479 systemd[1]: Starting systemd-timesyncd.service... Dec 13 01:53:01.723848 systemd[1]: Starting systemd-update-utmp.service... Dec 13 01:53:01.745000 audit[1389]: SYSTEM_BOOT pid=1389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.759380 kernel: audit: type=1127 audit(1734054781.745:197): pid=1389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.762494 systemd[1]: Finished systemd-update-utmp.service. Dec 13 01:53:01.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.776956 systemd[1]: Finished clean-ca-certificates.service. Dec 13 01:53:01.780755 kernel: audit: type=1130 audit(1734054781.763:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.780721 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:53:01.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.796330 kernel: audit: type=1130 audit(1734054781.779:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.858496 systemd[1]: Started systemd-timesyncd.service. Dec 13 01:53:01.860998 systemd[1]: Reached target time-set.target. Dec 13 01:53:01.875999 kernel: audit: type=1130 audit(1734054781.859:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.879677 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 01:53:01.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.897002 kernel: audit: type=1130 audit(1734054781.880:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.910918 systemd-resolved[1382]: Positive Trust Anchors: Dec 13 01:53:01.910934 systemd-resolved[1382]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:53:01.910997 systemd-resolved[1382]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:53:01.964247 systemd-timesyncd[1383]: Contacted time server 85.91.1.164:123 (0.flatcar.pool.ntp.org). Dec 13 01:53:01.965191 systemd-timesyncd[1383]: Initial clock synchronization to Fri 2024-12-13 01:53:01.964435 UTC. Dec 13 01:53:01.965227 systemd-resolved[1382]: Using system hostname 'ci-3510.3.6-a-39e591e923'. Dec 13 01:53:01.967101 systemd[1]: Started systemd-resolved.service. Dec 13 01:53:01.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.970287 systemd[1]: Reached target network.target. Dec 13 01:53:01.987363 kernel: audit: type=1130 audit(1734054781.968:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:01.986241 systemd[1]: Reached target network-online.target. Dec 13 01:53:01.988598 systemd[1]: Reached target nss-lookup.target. Dec 13 01:53:02.123000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:53:02.124682 augenrules[1399]: No rules Dec 13 01:53:02.125797 systemd[1]: Finished audit-rules.service. Dec 13 01:53:02.135115 kernel: audit: type=1305 audit(1734054782.123:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:53:02.123000 audit[1399]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed3ae74d0 a2=420 a3=0 items=0 ppid=1378 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:02.123000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 01:53:07.807323 ldconfig[1265]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 01:53:07.818290 systemd[1]: Finished ldconfig.service. Dec 13 01:53:07.822393 systemd[1]: Starting systemd-update-done.service... Dec 13 01:53:07.849898 systemd[1]: Finished systemd-update-done.service. Dec 13 01:53:07.854791 systemd[1]: Reached target sysinit.target. Dec 13 01:53:07.857172 systemd[1]: Started motdgen.path. Dec 13 01:53:07.858852 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 01:53:07.861773 systemd[1]: Started logrotate.timer. Dec 13 01:53:07.863588 systemd[1]: Started mdadm.timer. Dec 13 01:53:07.865181 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 01:53:07.867372 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 01:53:07.867409 systemd[1]: Reached target paths.target. Dec 13 01:53:07.869247 systemd[1]: Reached target timers.target. Dec 13 01:53:07.871455 systemd[1]: Listening on dbus.socket. Dec 13 01:53:07.874255 systemd[1]: Starting docker.socket... Dec 13 01:53:07.878601 systemd[1]: Listening on sshd.socket. Dec 13 01:53:07.880734 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:07.881159 systemd[1]: Listening on docker.socket. Dec 13 01:53:07.883205 systemd[1]: Reached target sockets.target. Dec 13 01:53:07.885198 systemd[1]: Reached target basic.target. Dec 13 01:53:07.887059 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:53:07.887095 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:53:07.888071 systemd[1]: Starting containerd.service... Dec 13 01:53:07.892080 systemd[1]: Starting dbus.service... Dec 13 01:53:07.894522 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 01:53:07.897830 systemd[1]: Starting extend-filesystems.service... Dec 13 01:53:07.900110 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 01:53:07.942187 systemd[1]: Starting kubelet.service... Dec 13 01:53:07.947626 systemd[1]: Starting motdgen.service... Dec 13 01:53:07.950899 systemd[1]: Started nvidia.service. Dec 13 01:53:07.956649 jq[1409]: false Dec 13 01:53:07.956943 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 01:53:07.960166 systemd[1]: Starting sshd-keygen.service... Dec 13 01:53:07.965558 systemd[1]: Starting systemd-logind.service... Dec 13 01:53:07.967740 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:07.967844 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 01:53:07.968370 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 01:53:07.969231 systemd[1]: Starting update-engine.service... Dec 13 01:53:07.972774 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 01:53:07.977826 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 01:53:07.978079 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 01:53:07.978197 jq[1421]: true Dec 13 01:53:07.998104 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 01:53:07.998313 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 01:53:08.003591 jq[1425]: true Dec 13 01:53:08.026049 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 01:53:08.026257 systemd[1]: Finished motdgen.service. Dec 13 01:53:08.028627 extend-filesystems[1410]: Found loop1 Dec 13 01:53:08.032353 extend-filesystems[1410]: Found sda Dec 13 01:53:08.035053 extend-filesystems[1410]: Found sda1 Dec 13 01:53:08.035053 extend-filesystems[1410]: Found sda2 Dec 13 01:53:08.035053 extend-filesystems[1410]: Found sda3 Dec 13 01:53:08.035053 extend-filesystems[1410]: Found usr Dec 13 01:53:08.035053 extend-filesystems[1410]: Found sda4 Dec 13 01:53:08.035053 extend-filesystems[1410]: Found sda6 Dec 13 01:53:08.035053 extend-filesystems[1410]: Found sda7 Dec 13 01:53:08.035053 extend-filesystems[1410]: Found sda9 Dec 13 01:53:08.035053 extend-filesystems[1410]: Checking size of /dev/sda9 Dec 13 01:53:08.084017 env[1436]: time="2024-12-13T01:53:08.083972568Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 01:53:08.111025 env[1436]: time="2024-12-13T01:53:08.110986410Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 01:53:08.111230 env[1436]: time="2024-12-13T01:53:08.111212713Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:08.112702 env[1436]: time="2024-12-13T01:53:08.112665032Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:53:08.112819 env[1436]: time="2024-12-13T01:53:08.112802233Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:08.113143 env[1436]: time="2024-12-13T01:53:08.113117737Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:53:08.113234 env[1436]: time="2024-12-13T01:53:08.113220239Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:08.113343 env[1436]: time="2024-12-13T01:53:08.113294440Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 01:53:08.113418 env[1436]: time="2024-12-13T01:53:08.113406641Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:08.113537 env[1436]: time="2024-12-13T01:53:08.113525743Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:08.113804 env[1436]: time="2024-12-13T01:53:08.113782446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:08.114060 env[1436]: time="2024-12-13T01:53:08.114037049Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:53:08.114143 env[1436]: time="2024-12-13T01:53:08.114128050Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 01:53:08.114271 env[1436]: time="2024-12-13T01:53:08.114253552Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 01:53:08.114405 env[1436]: time="2024-12-13T01:53:08.114389253Z" level=info msg="metadata content store policy set" policy=shared Dec 13 01:53:08.133877 extend-filesystems[1410]: Old size kept for /dev/sda9 Dec 13 01:53:08.136417 extend-filesystems[1410]: Found sr0 Dec 13 01:53:08.138801 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 01:53:08.138989 systemd[1]: Finished extend-filesystems.service. Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151516924Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151557224Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151578825Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151617125Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151636325Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151655125Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151672526Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151691326Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151708526Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151728826Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151746327Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151764127Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151874028Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 01:53:08.153261 env[1436]: time="2024-12-13T01:53:08.151958829Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160759341Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160807841Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160830342Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160891842Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160910343Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160928443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160945443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160963043Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160979844Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.160998444Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.161014544Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.161034344Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.161191346Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.161210447Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.161524 env[1436]: time="2024-12-13T01:53:08.161227747Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.162192 env[1436]: time="2024-12-13T01:53:08.161243547Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 01:53:08.162192 env[1436]: time="2024-12-13T01:53:08.161263247Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 01:53:08.162192 env[1436]: time="2024-12-13T01:53:08.161276847Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 01:53:08.162192 env[1436]: time="2024-12-13T01:53:08.161320848Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 01:53:08.162192 env[1436]: time="2024-12-13T01:53:08.161369049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 01:53:08.163496 env[1436]: time="2024-12-13T01:53:08.163001369Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 01:53:08.163496 env[1436]: time="2024-12-13T01:53:08.163098670Z" level=info msg="Connect containerd service" Dec 13 01:53:08.163496 env[1436]: time="2024-12-13T01:53:08.163159971Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.164521588Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.164724191Z" level=info msg="Start subscribing containerd event" Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.164810692Z" level=info msg="Start recovering state" Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.164850993Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.164897593Z" level=info msg="Start event monitor" Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.164899493Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.164971794Z" level=info msg="containerd successfully booted in 0.082047s" Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.164913093Z" level=info msg="Start snapshots syncer" Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.167482926Z" level=info msg="Start cni network conf syncer for default" Dec 13 01:53:08.193400 env[1436]: time="2024-12-13T01:53:08.167514826Z" level=info msg="Start streaming server" Dec 13 01:53:08.165042 systemd[1]: Started containerd.service. Dec 13 01:53:08.175898 systemd-logind[1418]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 01:53:08.177123 systemd-logind[1418]: New seat seat0. Dec 13 01:53:08.195482 bash[1450]: Updated "/home/core/.ssh/authorized_keys" Dec 13 01:53:08.196346 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 01:53:08.295637 dbus-daemon[1408]: [system] SELinux support is enabled Dec 13 01:53:08.295867 systemd[1]: Started dbus.service. Dec 13 01:53:08.300918 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 01:53:08.301484 dbus-daemon[1408]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 01:53:08.300951 systemd[1]: Reached target system-config.target. Dec 13 01:53:08.303585 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 01:53:08.303616 systemd[1]: Reached target user-config.target. Dec 13 01:53:08.306273 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 01:53:08.315283 systemd[1]: Started systemd-logind.service. Dec 13 01:53:08.949889 update_engine[1419]: I1213 01:53:08.949311 1419 main.cc:92] Flatcar Update Engine starting Dec 13 01:53:09.002232 systemd[1]: Started update-engine.service. Dec 13 01:53:09.002653 update_engine[1419]: I1213 01:53:09.002279 1419 update_check_scheduler.cc:74] Next update check in 8m26s Dec 13 01:53:09.007265 systemd[1]: Started locksmithd.service. Dec 13 01:53:09.222084 systemd[1]: Started kubelet.service. Dec 13 01:53:09.960187 kubelet[1515]: E1213 01:53:09.960146 1515 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:53:09.962900 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:53:09.963062 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:53:09.963330 systemd[1]: kubelet.service: Consumed 1.149s CPU time. Dec 13 01:53:10.191137 sshd_keygen[1435]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 01:53:10.210977 systemd[1]: Finished sshd-keygen.service. Dec 13 01:53:10.214998 systemd[1]: Starting issuegen.service... Dec 13 01:53:10.218362 systemd[1]: Started waagent.service. Dec 13 01:53:10.227979 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 01:53:10.228173 systemd[1]: Finished issuegen.service. Dec 13 01:53:10.231972 systemd[1]: Starting systemd-user-sessions.service... Dec 13 01:53:10.240733 systemd[1]: Finished systemd-user-sessions.service. Dec 13 01:53:10.244723 systemd[1]: Started getty@tty1.service. Dec 13 01:53:10.248389 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 01:53:10.251186 systemd[1]: Reached target getty.target. Dec 13 01:53:10.253544 systemd[1]: Reached target multi-user.target. Dec 13 01:53:10.257240 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 01:53:10.265071 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 01:53:10.265247 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 01:53:10.267945 systemd[1]: Startup finished in 831ms (firmware) + 30.600s (loader) + 963ms (kernel) + 13.544s (initrd) + 25.701s (userspace) = 1min 11.641s. Dec 13 01:53:10.549281 locksmithd[1512]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 01:53:10.636856 login[1537]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 01:53:10.638985 login[1538]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 01:53:10.666679 systemd[1]: Created slice user-500.slice. Dec 13 01:53:10.668814 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 01:53:10.672005 systemd-logind[1418]: New session 2 of user core. Dec 13 01:53:10.677221 systemd-logind[1418]: New session 1 of user core. Dec 13 01:53:10.682197 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 01:53:10.683851 systemd[1]: Starting user@500.service... Dec 13 01:53:10.704127 (systemd)[1543]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:53:10.860657 systemd[1543]: Queued start job for default target default.target. Dec 13 01:53:10.861248 systemd[1543]: Reached target paths.target. Dec 13 01:53:10.861271 systemd[1543]: Reached target sockets.target. Dec 13 01:53:10.861287 systemd[1543]: Reached target timers.target. Dec 13 01:53:10.861316 systemd[1543]: Reached target basic.target. Dec 13 01:53:10.861430 systemd[1]: Started user@500.service. Dec 13 01:53:10.862646 systemd[1]: Started session-1.scope. Dec 13 01:53:10.863445 systemd[1]: Started session-2.scope. Dec 13 01:53:10.864220 systemd[1543]: Reached target default.target. Dec 13 01:53:10.864430 systemd[1543]: Startup finished in 153ms. Dec 13 01:53:17.681746 waagent[1532]: 2024-12-13T01:53:17.681639Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 01:53:17.709818 waagent[1532]: 2024-12-13T01:53:17.699513Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 01:53:17.709818 waagent[1532]: 2024-12-13T01:53:17.700406Z INFO Daemon Daemon Python: 3.9.16 Dec 13 01:53:17.709818 waagent[1532]: 2024-12-13T01:53:17.701576Z INFO Daemon Daemon Run daemon Dec 13 01:53:17.709818 waagent[1532]: 2024-12-13T01:53:17.702479Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 01:53:17.714129 waagent[1532]: 2024-12-13T01:53:17.714005Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 01:53:17.722124 waagent[1532]: 2024-12-13T01:53:17.722014Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 01:53:17.727105 waagent[1532]: 2024-12-13T01:53:17.727034Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 01:53:17.729760 waagent[1532]: 2024-12-13T01:53:17.729699Z INFO Daemon Daemon Using waagent for provisioning Dec 13 01:53:17.732912 waagent[1532]: 2024-12-13T01:53:17.732842Z INFO Daemon Daemon Activate resource disk Dec 13 01:53:17.735564 waagent[1532]: 2024-12-13T01:53:17.735501Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 01:53:17.745582 waagent[1532]: 2024-12-13T01:53:17.745514Z INFO Daemon Daemon Found device: None Dec 13 01:53:17.748027 waagent[1532]: 2024-12-13T01:53:17.747961Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 01:53:17.752292 waagent[1532]: 2024-12-13T01:53:17.752232Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 01:53:17.758413 waagent[1532]: 2024-12-13T01:53:17.758354Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 01:53:17.761370 waagent[1532]: 2024-12-13T01:53:17.761290Z INFO Daemon Daemon Running default provisioning handler Dec 13 01:53:17.770611 waagent[1532]: 2024-12-13T01:53:17.770480Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 01:53:17.778731 waagent[1532]: 2024-12-13T01:53:17.778625Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 01:53:17.783725 waagent[1532]: 2024-12-13T01:53:17.783661Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 01:53:17.786413 waagent[1532]: 2024-12-13T01:53:17.786351Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 01:53:17.872494 waagent[1532]: 2024-12-13T01:53:17.871587Z INFO Daemon Daemon Successfully mounted dvd Dec 13 01:53:17.923209 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 01:53:17.940732 waagent[1532]: 2024-12-13T01:53:17.940573Z INFO Daemon Daemon Detect protocol endpoint Dec 13 01:53:17.943618 waagent[1532]: 2024-12-13T01:53:17.943549Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 01:53:17.946714 waagent[1532]: 2024-12-13T01:53:17.946648Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 01:53:17.950226 waagent[1532]: 2024-12-13T01:53:17.950163Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 01:53:17.953039 waagent[1532]: 2024-12-13T01:53:17.952975Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 01:53:17.955624 waagent[1532]: 2024-12-13T01:53:17.955561Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 01:53:18.102840 waagent[1532]: 2024-12-13T01:53:18.102760Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 01:53:18.111285 waagent[1532]: 2024-12-13T01:53:18.104826Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 01:53:18.111285 waagent[1532]: 2024-12-13T01:53:18.106319Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 01:53:18.718667 waagent[1532]: 2024-12-13T01:53:18.718516Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 01:53:18.731125 waagent[1532]: 2024-12-13T01:53:18.731047Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 01:53:18.734425 waagent[1532]: 2024-12-13T01:53:18.734356Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 01:53:18.824713 waagent[1532]: 2024-12-13T01:53:18.824502Z INFO Daemon Daemon Found private key matching thumbprint C6508D06C0520F0109943DE89AC442AA5F3121B1 Dec 13 01:53:18.835575 waagent[1532]: 2024-12-13T01:53:18.826125Z INFO Daemon Daemon Certificate with thumbprint 98CD79B9BB9BE577900FF82EE7E0A0D7C02E4FA7 has no matching private key. Dec 13 01:53:18.835575 waagent[1532]: 2024-12-13T01:53:18.827223Z INFO Daemon Daemon Fetch goal state completed Dec 13 01:53:18.874850 waagent[1532]: 2024-12-13T01:53:18.874764Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 6893c7d3-f2eb-4266-b882-d6f2875c7566 New eTag: 15124174343240351765] Dec 13 01:53:18.882969 waagent[1532]: 2024-12-13T01:53:18.876834Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 01:53:18.888774 waagent[1532]: 2024-12-13T01:53:18.888719Z INFO Daemon Daemon Starting provisioning Dec 13 01:53:18.895614 waagent[1532]: 2024-12-13T01:53:18.890153Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 01:53:18.895614 waagent[1532]: 2024-12-13T01:53:18.890999Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-39e591e923] Dec 13 01:53:18.910589 waagent[1532]: 2024-12-13T01:53:18.910482Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-39e591e923] Dec 13 01:53:18.918558 waagent[1532]: 2024-12-13T01:53:18.912017Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 01:53:18.918558 waagent[1532]: 2024-12-13T01:53:18.912951Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 01:53:18.926088 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 01:53:18.926357 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 01:53:18.926429 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 01:53:18.926774 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:53:18.931350 systemd-networkd[1200]: eth0: DHCPv6 lease lost Dec 13 01:53:18.932596 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:53:18.932753 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:53:18.935067 systemd[1]: Starting systemd-networkd.service... Dec 13 01:53:18.966720 systemd-networkd[1587]: enP60479s1: Link UP Dec 13 01:53:18.966730 systemd-networkd[1587]: enP60479s1: Gained carrier Dec 13 01:53:18.968040 systemd-networkd[1587]: eth0: Link UP Dec 13 01:53:18.968049 systemd-networkd[1587]: eth0: Gained carrier Dec 13 01:53:18.968495 systemd-networkd[1587]: lo: Link UP Dec 13 01:53:18.968504 systemd-networkd[1587]: lo: Gained carrier Dec 13 01:53:18.968811 systemd-networkd[1587]: eth0: Gained IPv6LL Dec 13 01:53:18.969097 systemd-networkd[1587]: Enumeration completed Dec 13 01:53:18.980887 waagent[1532]: 2024-12-13T01:53:18.970266Z INFO Daemon Daemon Create user account if not exists Dec 13 01:53:18.980887 waagent[1532]: 2024-12-13T01:53:18.978523Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 01:53:18.980887 waagent[1532]: 2024-12-13T01:53:18.980186Z INFO Daemon Daemon Configure sudoer Dec 13 01:53:18.969193 systemd[1]: Started systemd-networkd.service. Dec 13 01:53:18.974270 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:53:18.981592 waagent[1532]: 2024-12-13T01:53:18.981531Z INFO Daemon Daemon Configure sshd Dec 13 01:53:18.982721 waagent[1532]: 2024-12-13T01:53:18.982666Z INFO Daemon Daemon Deploy ssh public key. Dec 13 01:53:18.985597 systemd-networkd[1587]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:53:19.033376 systemd-networkd[1587]: eth0: DHCPv4 address 10.200.8.19/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:53:19.035802 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:53:20.074747 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 01:53:20.075071 systemd[1]: Stopped kubelet.service. Dec 13 01:53:20.075130 systemd[1]: kubelet.service: Consumed 1.149s CPU time. Dec 13 01:53:20.077085 systemd[1]: Starting kubelet.service... Dec 13 01:53:20.152014 waagent[1532]: 2024-12-13T01:53:20.151931Z INFO Daemon Daemon Provisioning complete Dec 13 01:53:20.163987 systemd[1]: Started kubelet.service. Dec 13 01:53:20.167202 waagent[1532]: 2024-12-13T01:53:20.167132Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 01:53:20.169159 waagent[1532]: 2024-12-13T01:53:20.169098Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 01:53:20.172039 waagent[1532]: 2024-12-13T01:53:20.171974Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 01:53:20.818063 kubelet[1600]: E1213 01:53:20.818014 1600 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:53:20.821950 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:53:20.822104 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:53:20.891869 waagent[1604]: 2024-12-13T01:53:20.891763Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 01:53:20.892707 waagent[1604]: 2024-12-13T01:53:20.892643Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:53:20.892852 waagent[1604]: 2024-12-13T01:53:20.892800Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:53:20.903843 waagent[1604]: 2024-12-13T01:53:20.903771Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 01:53:20.903995 waagent[1604]: 2024-12-13T01:53:20.903943Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 01:53:20.964977 waagent[1604]: 2024-12-13T01:53:20.964866Z INFO ExtHandler ExtHandler Found private key matching thumbprint C6508D06C0520F0109943DE89AC442AA5F3121B1 Dec 13 01:53:20.965186 waagent[1604]: 2024-12-13T01:53:20.965130Z INFO ExtHandler ExtHandler Certificate with thumbprint 98CD79B9BB9BE577900FF82EE7E0A0D7C02E4FA7 has no matching private key. Dec 13 01:53:20.965444 waagent[1604]: 2024-12-13T01:53:20.965389Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 01:53:20.978413 waagent[1604]: 2024-12-13T01:53:20.978352Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 18efb05a-475a-4745-aa8c-3e12795229cf New eTag: 15124174343240351765] Dec 13 01:53:20.978924 waagent[1604]: 2024-12-13T01:53:20.978864Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 01:53:21.103337 waagent[1604]: 2024-12-13T01:53:21.103155Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 01:53:21.132274 waagent[1604]: 2024-12-13T01:53:21.132155Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1604 Dec 13 01:53:21.135708 waagent[1604]: 2024-12-13T01:53:21.135640Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 01:53:21.136919 waagent[1604]: 2024-12-13T01:53:21.136860Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 01:53:21.217067 waagent[1604]: 2024-12-13T01:53:21.217001Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 01:53:21.217485 waagent[1604]: 2024-12-13T01:53:21.217421Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 01:53:21.225324 waagent[1604]: 2024-12-13T01:53:21.225254Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 01:53:21.225797 waagent[1604]: 2024-12-13T01:53:21.225736Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 01:53:21.226840 waagent[1604]: 2024-12-13T01:53:21.226774Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 01:53:21.228114 waagent[1604]: 2024-12-13T01:53:21.228054Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 01:53:21.228816 waagent[1604]: 2024-12-13T01:53:21.228746Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 01:53:21.229046 waagent[1604]: 2024-12-13T01:53:21.228992Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:53:21.229256 waagent[1604]: 2024-12-13T01:53:21.229205Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:53:21.229726 waagent[1604]: 2024-12-13T01:53:21.229667Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 01:53:21.230024 waagent[1604]: 2024-12-13T01:53:21.229972Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 01:53:21.230213 waagent[1604]: 2024-12-13T01:53:21.230164Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:53:21.230712 waagent[1604]: 2024-12-13T01:53:21.230653Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:53:21.230949 waagent[1604]: 2024-12-13T01:53:21.230895Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 01:53:21.231483 waagent[1604]: 2024-12-13T01:53:21.231426Z INFO EnvHandler ExtHandler Configure routes Dec 13 01:53:21.231741 waagent[1604]: 2024-12-13T01:53:21.231688Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 01:53:21.232961 waagent[1604]: 2024-12-13T01:53:21.232896Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 01:53:21.233253 waagent[1604]: 2024-12-13T01:53:21.233197Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 01:53:21.233253 waagent[1604]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 01:53:21.233253 waagent[1604]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 01:53:21.233253 waagent[1604]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 01:53:21.233253 waagent[1604]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:53:21.233253 waagent[1604]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:53:21.233253 waagent[1604]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:53:21.235106 waagent[1604]: 2024-12-13T01:53:21.234930Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 01:53:21.236651 waagent[1604]: 2024-12-13T01:53:21.236597Z INFO EnvHandler ExtHandler Gateway:None Dec 13 01:53:21.243509 waagent[1604]: 2024-12-13T01:53:21.243433Z INFO EnvHandler ExtHandler Routes:None Dec 13 01:53:21.247331 waagent[1604]: 2024-12-13T01:53:21.247261Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 01:53:21.249196 waagent[1604]: 2024-12-13T01:53:21.249147Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 01:53:21.251217 waagent[1604]: 2024-12-13T01:53:21.251160Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 01:53:21.294422 waagent[1604]: 2024-12-13T01:53:21.294294Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1587' Dec 13 01:53:21.301837 waagent[1604]: 2024-12-13T01:53:21.301772Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 01:53:21.377585 waagent[1604]: 2024-12-13T01:53:21.377420Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 01:53:21.377585 waagent[1604]: Executing ['ip', '-a', '-o', 'link']: Dec 13 01:53:21.377585 waagent[1604]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 01:53:21.377585 waagent[1604]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:df:b6:32 brd ff:ff:ff:ff:ff:ff Dec 13 01:53:21.377585 waagent[1604]: 3: enP60479s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:df:b6:32 brd ff:ff:ff:ff:ff:ff\ altname enP60479p0s2 Dec 13 01:53:21.377585 waagent[1604]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 01:53:21.377585 waagent[1604]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 01:53:21.377585 waagent[1604]: 2: eth0 inet 10.200.8.19/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 01:53:21.377585 waagent[1604]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 01:53:21.377585 waagent[1604]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 01:53:21.377585 waagent[1604]: 2: eth0 inet6 fe80::6245:bdff:fedf:b632/64 scope link \ valid_lft forever preferred_lft forever Dec 13 01:53:21.604094 waagent[1604]: 2024-12-13T01:53:21.604025Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 01:53:22.176716 waagent[1532]: 2024-12-13T01:53:22.176552Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 01:53:22.182828 waagent[1532]: 2024-12-13T01:53:22.182767Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 01:53:23.217524 waagent[1638]: 2024-12-13T01:53:23.217419Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 01:53:23.218228 waagent[1638]: 2024-12-13T01:53:23.218159Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 01:53:23.218402 waagent[1638]: 2024-12-13T01:53:23.218344Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 01:53:23.218555 waagent[1638]: 2024-12-13T01:53:23.218507Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Dec 13 01:53:23.227984 waagent[1638]: 2024-12-13T01:53:23.227885Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 01:53:23.228378 waagent[1638]: 2024-12-13T01:53:23.228320Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:53:23.228544 waagent[1638]: 2024-12-13T01:53:23.228496Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:53:23.240537 waagent[1638]: 2024-12-13T01:53:23.240465Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 01:53:23.253259 waagent[1638]: 2024-12-13T01:53:23.253199Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 01:53:23.254176 waagent[1638]: 2024-12-13T01:53:23.254116Z INFO ExtHandler Dec 13 01:53:23.254335 waagent[1638]: 2024-12-13T01:53:23.254273Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 76bd5d5e-fc31-4c83-bf73-90119c55e232 eTag: 15124174343240351765 source: Fabric] Dec 13 01:53:23.255023 waagent[1638]: 2024-12-13T01:53:23.254966Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 01:53:23.256114 waagent[1638]: 2024-12-13T01:53:23.256053Z INFO ExtHandler Dec 13 01:53:23.256248 waagent[1638]: 2024-12-13T01:53:23.256198Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 01:53:23.263241 waagent[1638]: 2024-12-13T01:53:23.263190Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 01:53:23.263665 waagent[1638]: 2024-12-13T01:53:23.263618Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 01:53:23.281467 waagent[1638]: 2024-12-13T01:53:23.281413Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 01:53:23.343225 waagent[1638]: 2024-12-13T01:53:23.343096Z INFO ExtHandler Downloaded certificate {'thumbprint': 'C6508D06C0520F0109943DE89AC442AA5F3121B1', 'hasPrivateKey': True} Dec 13 01:53:23.344145 waagent[1638]: 2024-12-13T01:53:23.344079Z INFO ExtHandler Downloaded certificate {'thumbprint': '98CD79B9BB9BE577900FF82EE7E0A0D7C02E4FA7', 'hasPrivateKey': False} Dec 13 01:53:23.345120 waagent[1638]: 2024-12-13T01:53:23.345058Z INFO ExtHandler Fetch goal state completed Dec 13 01:53:23.365146 waagent[1638]: 2024-12-13T01:53:23.365049Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 01:53:23.376228 waagent[1638]: 2024-12-13T01:53:23.376146Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1638 Dec 13 01:53:23.379211 waagent[1638]: 2024-12-13T01:53:23.379149Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 01:53:23.380142 waagent[1638]: 2024-12-13T01:53:23.380083Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 01:53:23.380437 waagent[1638]: 2024-12-13T01:53:23.380380Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 01:53:23.382365 waagent[1638]: 2024-12-13T01:53:23.382292Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 01:53:23.386781 waagent[1638]: 2024-12-13T01:53:23.386728Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 01:53:23.387148 waagent[1638]: 2024-12-13T01:53:23.387091Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 01:53:23.394886 waagent[1638]: 2024-12-13T01:53:23.394832Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 01:53:23.395336 waagent[1638]: 2024-12-13T01:53:23.395267Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 01:53:23.401031 waagent[1638]: 2024-12-13T01:53:23.400939Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Dec 13 01:53:23.402049 waagent[1638]: 2024-12-13T01:53:23.401984Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 01:53:23.403505 waagent[1638]: 2024-12-13T01:53:23.403446Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 01:53:23.404293 waagent[1638]: 2024-12-13T01:53:23.404238Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 01:53:23.404423 waagent[1638]: 2024-12-13T01:53:23.404358Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:53:23.404750 waagent[1638]: 2024-12-13T01:53:23.404696Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:53:23.405095 waagent[1638]: 2024-12-13T01:53:23.405045Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:53:23.405188 waagent[1638]: 2024-12-13T01:53:23.405133Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:53:23.405922 waagent[1638]: 2024-12-13T01:53:23.405867Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 01:53:23.406271 waagent[1638]: 2024-12-13T01:53:23.406219Z INFO EnvHandler ExtHandler Configure routes Dec 13 01:53:23.406894 waagent[1638]: 2024-12-13T01:53:23.406837Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 01:53:23.407164 waagent[1638]: 2024-12-13T01:53:23.407109Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 01:53:23.407365 waagent[1638]: 2024-12-13T01:53:23.407293Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 01:53:23.407365 waagent[1638]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 01:53:23.407365 waagent[1638]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 01:53:23.407365 waagent[1638]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 01:53:23.407365 waagent[1638]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:53:23.407365 waagent[1638]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:53:23.407365 waagent[1638]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:53:23.407654 waagent[1638]: 2024-12-13T01:53:23.407415Z INFO EnvHandler ExtHandler Gateway:None Dec 13 01:53:23.407654 waagent[1638]: 2024-12-13T01:53:23.407573Z INFO EnvHandler ExtHandler Routes:None Dec 13 01:53:23.420997 waagent[1638]: 2024-12-13T01:53:23.420739Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 01:53:23.421877 waagent[1638]: 2024-12-13T01:53:23.420586Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 01:53:23.425140 waagent[1638]: 2024-12-13T01:53:23.424920Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 01:53:23.434282 waagent[1638]: 2024-12-13T01:53:23.434225Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 01:53:23.434282 waagent[1638]: Executing ['ip', '-a', '-o', 'link']: Dec 13 01:53:23.434282 waagent[1638]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 01:53:23.434282 waagent[1638]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:df:b6:32 brd ff:ff:ff:ff:ff:ff Dec 13 01:53:23.434282 waagent[1638]: 3: enP60479s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:df:b6:32 brd ff:ff:ff:ff:ff:ff\ altname enP60479p0s2 Dec 13 01:53:23.434282 waagent[1638]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 01:53:23.434282 waagent[1638]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 01:53:23.434282 waagent[1638]: 2: eth0 inet 10.200.8.19/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 01:53:23.434282 waagent[1638]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 01:53:23.434282 waagent[1638]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 01:53:23.434282 waagent[1638]: 2: eth0 inet6 fe80::6245:bdff:fedf:b632/64 scope link \ valid_lft forever preferred_lft forever Dec 13 01:53:23.439936 waagent[1638]: 2024-12-13T01:53:23.439878Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 01:53:23.465253 waagent[1638]: 2024-12-13T01:53:23.465190Z INFO ExtHandler ExtHandler Dec 13 01:53:23.467505 waagent[1638]: 2024-12-13T01:53:23.467435Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 483586e9-5b8a-40cb-b848-584570e76f8f correlation 50c47fcd-514d-4c8f-baf1-139f928d3e57 created: 2024-12-13T01:51:47.657959Z] Dec 13 01:53:23.473022 waagent[1638]: 2024-12-13T01:53:23.472861Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 01:53:23.475184 waagent[1638]: 2024-12-13T01:53:23.475125Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 9 ms] Dec 13 01:53:23.505176 waagent[1638]: 2024-12-13T01:53:23.505108Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 01:53:23.516437 waagent[1638]: 2024-12-13T01:53:23.516373Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: A03BBA6F-3B33-4D74-95FF-C6E3327F65CA;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 01:53:23.631337 waagent[1638]: 2024-12-13T01:53:23.631190Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Dec 13 01:53:23.631337 waagent[1638]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:53:23.631337 waagent[1638]: pkts bytes target prot opt in out source destination Dec 13 01:53:23.631337 waagent[1638]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:53:23.631337 waagent[1638]: pkts bytes target prot opt in out source destination Dec 13 01:53:23.631337 waagent[1638]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:53:23.631337 waagent[1638]: pkts bytes target prot opt in out source destination Dec 13 01:53:23.631337 waagent[1638]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 01:53:23.631337 waagent[1638]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 01:53:23.631337 waagent[1638]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 01:53:23.638210 waagent[1638]: 2024-12-13T01:53:23.638110Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 01:53:23.638210 waagent[1638]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:53:23.638210 waagent[1638]: pkts bytes target prot opt in out source destination Dec 13 01:53:23.638210 waagent[1638]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:53:23.638210 waagent[1638]: pkts bytes target prot opt in out source destination Dec 13 01:53:23.638210 waagent[1638]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:53:23.638210 waagent[1638]: pkts bytes target prot opt in out source destination Dec 13 01:53:23.638210 waagent[1638]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 01:53:23.638210 waagent[1638]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 01:53:23.638210 waagent[1638]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 01:53:23.638753 waagent[1638]: 2024-12-13T01:53:23.638700Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 01:53:30.824295 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 01:53:30.824601 systemd[1]: Stopped kubelet.service. Dec 13 01:53:30.826280 systemd[1]: Starting kubelet.service... Dec 13 01:53:31.158190 systemd[1]: Started kubelet.service. Dec 13 01:53:31.465343 kubelet[1693]: E1213 01:53:31.465227 1693 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:53:31.467075 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:53:31.467231 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:53:41.574585 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 01:53:41.574864 systemd[1]: Stopped kubelet.service. Dec 13 01:53:41.576804 systemd[1]: Starting kubelet.service... Dec 13 01:53:41.903358 systemd[1]: Started kubelet.service. Dec 13 01:53:42.249275 kubelet[1703]: E1213 01:53:42.249156 1703 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:53:42.250832 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:53:42.250993 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:53:46.956621 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Dec 13 01:53:52.324465 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 01:53:52.324781 systemd[1]: Stopped kubelet.service. Dec 13 01:53:52.326783 systemd[1]: Starting kubelet.service... Dec 13 01:53:52.656128 systemd[1]: Started kubelet.service. Dec 13 01:53:52.969875 kubelet[1713]: E1213 01:53:52.969761 1713 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:53:52.971446 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:53:52.971603 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:53:54.093945 update_engine[1419]: I1213 01:53:54.093858 1419 update_attempter.cc:509] Updating boot flags... Dec 13 01:53:55.160372 systemd[1]: Created slice system-sshd.slice. Dec 13 01:53:55.162692 systemd[1]: Started sshd@0-10.200.8.19:22-10.200.16.10:56630.service. Dec 13 01:53:55.991808 sshd[1759]: Accepted publickey for core from 10.200.16.10 port 56630 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:53:55.993461 sshd[1759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:53:55.997355 systemd-logind[1418]: New session 3 of user core. Dec 13 01:53:55.998296 systemd[1]: Started session-3.scope. Dec 13 01:53:56.533899 systemd[1]: Started sshd@1-10.200.8.19:22-10.200.16.10:56632.service. Dec 13 01:53:57.156706 sshd[1764]: Accepted publickey for core from 10.200.16.10 port 56632 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:53:57.158383 sshd[1764]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:53:57.164052 systemd[1]: Started session-4.scope. Dec 13 01:53:57.164638 systemd-logind[1418]: New session 4 of user core. Dec 13 01:53:57.599127 sshd[1764]: pam_unix(sshd:session): session closed for user core Dec 13 01:53:57.602028 systemd[1]: sshd@1-10.200.8.19:22-10.200.16.10:56632.service: Deactivated successfully. Dec 13 01:53:57.602954 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 01:53:57.603631 systemd-logind[1418]: Session 4 logged out. Waiting for processes to exit. Dec 13 01:53:57.604400 systemd-logind[1418]: Removed session 4. Dec 13 01:53:57.703568 systemd[1]: Started sshd@2-10.200.8.19:22-10.200.16.10:56648.service. Dec 13 01:53:58.328768 sshd[1770]: Accepted publickey for core from 10.200.16.10 port 56648 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:53:58.330385 sshd[1770]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:53:58.335035 systemd[1]: Started session-5.scope. Dec 13 01:53:58.335642 systemd-logind[1418]: New session 5 of user core. Dec 13 01:53:58.770959 sshd[1770]: pam_unix(sshd:session): session closed for user core Dec 13 01:53:58.774556 systemd[1]: sshd@2-10.200.8.19:22-10.200.16.10:56648.service: Deactivated successfully. Dec 13 01:53:58.775571 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 01:53:58.776367 systemd-logind[1418]: Session 5 logged out. Waiting for processes to exit. Dec 13 01:53:58.777238 systemd-logind[1418]: Removed session 5. Dec 13 01:53:58.874412 systemd[1]: Started sshd@3-10.200.8.19:22-10.200.16.10:44228.service. Dec 13 01:53:59.496390 sshd[1778]: Accepted publickey for core from 10.200.16.10 port 44228 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:53:59.497742 sshd[1778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:53:59.502346 systemd[1]: Started session-6.scope. Dec 13 01:53:59.502855 systemd-logind[1418]: New session 6 of user core. Dec 13 01:53:59.941776 sshd[1778]: pam_unix(sshd:session): session closed for user core Dec 13 01:53:59.944713 systemd[1]: sshd@3-10.200.8.19:22-10.200.16.10:44228.service: Deactivated successfully. Dec 13 01:53:59.945629 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 01:53:59.946322 systemd-logind[1418]: Session 6 logged out. Waiting for processes to exit. Dec 13 01:53:59.947102 systemd-logind[1418]: Removed session 6. Dec 13 01:54:00.046694 systemd[1]: Started sshd@4-10.200.8.19:22-10.200.16.10:44244.service. Dec 13 01:54:00.671754 sshd[1784]: Accepted publickey for core from 10.200.16.10 port 44244 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:00.673428 sshd[1784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:00.679182 systemd[1]: Started session-7.scope. Dec 13 01:54:00.679936 systemd-logind[1418]: New session 7 of user core. Dec 13 01:54:01.276246 sudo[1787]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 01:54:01.276561 sudo[1787]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:01.329535 dbus-daemon[1408]: Н\x92\xddwU: received setenforce notice (enforcing=1727850864) Dec 13 01:54:01.331405 sudo[1787]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:01.464608 sshd[1784]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:01.468154 systemd[1]: sshd@4-10.200.8.19:22-10.200.16.10:44244.service: Deactivated successfully. Dec 13 01:54:01.469063 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 01:54:01.469693 systemd-logind[1418]: Session 7 logged out. Waiting for processes to exit. Dec 13 01:54:01.470506 systemd-logind[1418]: Removed session 7. Dec 13 01:54:01.568932 systemd[1]: Started sshd@5-10.200.8.19:22-10.200.16.10:44256.service. Dec 13 01:54:02.192921 sshd[1791]: Accepted publickey for core from 10.200.16.10 port 44256 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:02.194605 sshd[1791]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:02.199193 systemd[1]: Started session-8.scope. Dec 13 01:54:02.199798 systemd-logind[1418]: New session 8 of user core. Dec 13 01:54:02.535857 sudo[1795]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 01:54:02.536457 sudo[1795]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:02.539128 sudo[1795]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:02.543622 sudo[1794]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 01:54:02.543909 sudo[1794]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:02.552461 systemd[1]: Stopping audit-rules.service... Dec 13 01:54:02.557336 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 01:54:02.557396 kernel: audit: type=1305 audit(1734054842.552:204): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:54:02.552000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:54:02.557610 auditctl[1798]: No rules Dec 13 01:54:02.558096 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 01:54:02.558247 systemd[1]: Stopped audit-rules.service. Dec 13 01:54:02.559706 systemd[1]: Starting audit-rules.service... Dec 13 01:54:02.552000 audit[1798]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff62407830 a2=420 a3=0 items=0 ppid=1 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:02.579839 kernel: audit: type=1300 audit(1734054842.552:204): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff62407830 a2=420 a3=0 items=0 ppid=1 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:02.552000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:54:02.581701 augenrules[1815]: No rules Dec 13 01:54:02.582392 systemd[1]: Finished audit-rules.service. Dec 13 01:54:02.585148 kernel: audit: type=1327 audit(1734054842.552:204): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:54:02.585204 kernel: audit: type=1131 audit(1734054842.555:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.584357 sudo[1794]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:02.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.607716 kernel: audit: type=1130 audit(1734054842.578:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.578000 audit[1794]: USER_END pid=1794 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.620243 kernel: audit: type=1106 audit(1734054842.578:207): pid=1794 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.620308 kernel: audit: type=1104 audit(1734054842.578:208): pid=1794 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.578000 audit[1794]: CRED_DISP pid=1794 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.686546 sshd[1791]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:02.686000 audit[1791]: USER_END pid=1791 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:02.689792 systemd[1]: sshd@5-10.200.8.19:22-10.200.16.10:44256.service: Deactivated successfully. Dec 13 01:54:02.690636 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 01:54:02.692173 systemd-logind[1418]: Session 8 logged out. Waiting for processes to exit. Dec 13 01:54:02.693231 systemd-logind[1418]: Removed session 8. Dec 13 01:54:02.686000 audit[1791]: CRED_DISP pid=1791 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:02.722265 kernel: audit: type=1106 audit(1734054842.686:209): pid=1791 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:02.722331 kernel: audit: type=1104 audit(1734054842.686:210): pid=1791 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:02.722361 kernel: audit: type=1131 audit(1734054842.686:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.19:22-10.200.16.10:44256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.19:22-10.200.16.10:44256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:02.791175 systemd[1]: Started sshd@6-10.200.8.19:22-10.200.16.10:44264.service. Dec 13 01:54:02.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.19:22-10.200.16.10:44264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:03.074591 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 01:54:03.074878 systemd[1]: Stopped kubelet.service. Dec 13 01:54:03.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:03.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:03.077012 systemd[1]: Starting kubelet.service... Dec 13 01:54:03.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:03.232648 systemd[1]: Started kubelet.service. Dec 13 01:54:03.270949 kubelet[1827]: E1213 01:54:03.270902 1827 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:54:03.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:54:03.272511 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:54:03.272622 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:54:03.414000 audit[1821]: USER_ACCT pid=1821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:03.416625 sshd[1821]: Accepted publickey for core from 10.200.16.10 port 44264 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:03.416000 audit[1821]: CRED_ACQ pid=1821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:03.416000 audit[1821]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe206717d0 a2=3 a3=0 items=0 ppid=1 pid=1821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:03.416000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:54:03.417934 sshd[1821]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:03.422937 systemd[1]: Started session-9.scope. Dec 13 01:54:03.423406 systemd-logind[1418]: New session 9 of user core. Dec 13 01:54:03.426000 audit[1821]: USER_START pid=1821 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:03.428000 audit[1834]: CRED_ACQ pid=1834 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:03.758000 audit[1835]: USER_ACCT pid=1835 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:03.759948 sudo[1835]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 01:54:03.758000 audit[1835]: CRED_REFR pid=1835 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:03.760235 sudo[1835]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:03.760000 audit[1835]: USER_START pid=1835 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:03.773597 systemd[1]: Starting coreos-metadata.service... Dec 13 01:54:03.844285 coreos-metadata[1839]: Dec 13 01:54:03.844 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 01:54:03.847534 coreos-metadata[1839]: Dec 13 01:54:03.847 INFO Fetch successful Dec 13 01:54:03.847790 coreos-metadata[1839]: Dec 13 01:54:03.847 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Dec 13 01:54:03.850054 coreos-metadata[1839]: Dec 13 01:54:03.849 INFO Fetch successful Dec 13 01:54:03.850434 coreos-metadata[1839]: Dec 13 01:54:03.850 INFO Fetching http://168.63.129.16/machine/7249749d-7427-4407-a1e6-5578de296ce5/e7fc9f74%2D8eff%2D4eda%2Db32d%2Db399b3e444da.%5Fci%2D3510.3.6%2Da%2D39e591e923?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Dec 13 01:54:03.852835 coreos-metadata[1839]: Dec 13 01:54:03.852 INFO Fetch successful Dec 13 01:54:03.885663 coreos-metadata[1839]: Dec 13 01:54:03.885 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Dec 13 01:54:03.898647 coreos-metadata[1839]: Dec 13 01:54:03.898 INFO Fetch successful Dec 13 01:54:03.906971 systemd[1]: Finished coreos-metadata.service. Dec 13 01:54:03.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:07.589601 systemd[1]: Stopped kubelet.service. Dec 13 01:54:07.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:07.593805 kernel: kauditd_printk_skb: 16 callbacks suppressed Dec 13 01:54:07.593880 kernel: audit: type=1130 audit(1734054847.589:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:07.594231 systemd[1]: Starting kubelet.service... Dec 13 01:54:07.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:07.625348 kernel: audit: type=1131 audit(1734054847.589:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:07.625525 systemd[1]: Reloading. Dec 13 01:54:07.718578 /usr/lib/systemd/system-generators/torcx-generator[1900]: time="2024-12-13T01:54:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:54:07.718616 /usr/lib/systemd/system-generators/torcx-generator[1900]: time="2024-12-13T01:54:07Z" level=info msg="torcx already run" Dec 13 01:54:07.832627 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:54:07.832645 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:54:07.849098 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:54:07.929412 kernel: audit: type=1400 audit(1734054847.916:228): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954632 kernel: audit: type=1400 audit(1734054847.916:229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954717 kernel: audit: type=1400 audit(1734054847.916:230): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.971720 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 01:54:07.971779 kernel: audit: type=1400 audit(1734054847.916:231): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.971801 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 01:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.989784 kernel: audit: type=1400 audit(1734054847.916:232): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.989837 kernel: audit: backlog limit exceeded Dec 13 01:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.928000 audit: BPF prog-id=41 op=LOAD Dec 13 01:54:07.928000 audit: BPF prog-id=38 op=UNLOAD Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.929000 audit: BPF prog-id=42 op=LOAD Dec 13 01:54:07.929000 audit: BPF prog-id=24 op=UNLOAD Dec 13 01:54:07.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit: BPF prog-id=43 op=LOAD Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.941000 audit: BPF prog-id=44 op=LOAD Dec 13 01:54:07.941000 audit: BPF prog-id=25 op=UNLOAD Dec 13 01:54:07.941000 audit: BPF prog-id=26 op=UNLOAD Dec 13 01:54:07.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit: BPF prog-id=45 op=LOAD Dec 13 01:54:07.954000 audit: BPF prog-id=35 op=UNLOAD Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.954000 audit: BPF prog-id=46 op=LOAD Dec 13 01:54:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit: BPF prog-id=47 op=LOAD Dec 13 01:54:07.994000 audit: BPF prog-id=36 op=UNLOAD Dec 13 01:54:07.994000 audit: BPF prog-id=37 op=UNLOAD Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.995000 audit: BPF prog-id=48 op=LOAD Dec 13 01:54:07.995000 audit: BPF prog-id=40 op=UNLOAD Dec 13 01:54:07.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit: BPF prog-id=49 op=LOAD Dec 13 01:54:07.997000 audit: BPF prog-id=28 op=UNLOAD Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit: BPF prog-id=50 op=LOAD Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit: BPF prog-id=51 op=LOAD Dec 13 01:54:07.997000 audit: BPF prog-id=29 op=UNLOAD Dec 13 01:54:07.997000 audit: BPF prog-id=30 op=UNLOAD Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit: BPF prog-id=52 op=LOAD Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.997000 audit: BPF prog-id=53 op=LOAD Dec 13 01:54:07.998000 audit: BPF prog-id=31 op=UNLOAD Dec 13 01:54:07.998000 audit: BPF prog-id=32 op=UNLOAD Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:07.999000 audit: BPF prog-id=54 op=LOAD Dec 13 01:54:07.999000 audit: BPF prog-id=33 op=UNLOAD Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:08.001000 audit: BPF prog-id=55 op=LOAD Dec 13 01:54:08.001000 audit: BPF prog-id=34 op=UNLOAD Dec 13 01:54:08.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:08.019818 systemd[1]: Started kubelet.service. Dec 13 01:54:08.022241 systemd[1]: Stopping kubelet.service... Dec 13 01:54:08.022577 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:54:08.022757 systemd[1]: Stopped kubelet.service. Dec 13 01:54:08.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:08.024966 systemd[1]: Starting kubelet.service... Dec 13 01:54:08.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:08.269229 systemd[1]: Started kubelet.service. Dec 13 01:54:08.306325 kubelet[1967]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:54:08.306644 kubelet[1967]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:54:08.306686 kubelet[1967]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:54:08.892753 kubelet[1967]: I1213 01:54:08.892673 1967 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:54:09.024113 kubelet[1967]: I1213 01:54:09.024074 1967 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 01:54:09.024113 kubelet[1967]: I1213 01:54:09.024101 1967 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:54:09.024376 kubelet[1967]: I1213 01:54:09.024356 1967 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 01:54:09.050381 kubelet[1967]: I1213 01:54:09.050348 1967 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:54:09.062208 kubelet[1967]: I1213 01:54:09.062187 1967 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:54:09.063071 kubelet[1967]: I1213 01:54:09.063027 1967 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:54:09.063246 kubelet[1967]: I1213 01:54:09.063068 1967 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.8.19","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 01:54:09.063470 kubelet[1967]: I1213 01:54:09.063262 1967 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:54:09.063470 kubelet[1967]: I1213 01:54:09.063273 1967 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 01:54:09.063470 kubelet[1967]: I1213 01:54:09.063426 1967 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:54:09.064268 kubelet[1967]: I1213 01:54:09.064251 1967 kubelet.go:400] "Attempting to sync node with API server" Dec 13 01:54:09.064349 kubelet[1967]: I1213 01:54:09.064272 1967 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:54:09.064349 kubelet[1967]: I1213 01:54:09.064297 1967 kubelet.go:312] "Adding apiserver pod source" Dec 13 01:54:09.064349 kubelet[1967]: I1213 01:54:09.064338 1967 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:54:09.065223 kubelet[1967]: E1213 01:54:09.065199 1967 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:09.065627 kubelet[1967]: E1213 01:54:09.065610 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:09.068204 kubelet[1967]: I1213 01:54:09.068173 1967 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:54:09.069746 kubelet[1967]: I1213 01:54:09.069728 1967 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:54:09.069855 kubelet[1967]: W1213 01:54:09.069839 1967 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 01:54:09.070094 kubelet[1967]: W1213 01:54:09.070075 1967 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.200.8.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 01:54:09.070201 kubelet[1967]: E1213 01:54:09.070190 1967 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 01:54:09.070706 kubelet[1967]: W1213 01:54:09.070680 1967 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 01:54:09.070823 kubelet[1967]: E1213 01:54:09.070810 1967 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 01:54:09.071013 kubelet[1967]: I1213 01:54:09.070995 1967 server.go:1264] "Started kubelet" Dec 13 01:54:09.072682 kubelet[1967]: I1213 01:54:09.072632 1967 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:54:09.082139 kubelet[1967]: I1213 01:54:09.082113 1967 server.go:455] "Adding debug handlers to kubelet server" Dec 13 01:54:09.084507 kubelet[1967]: I1213 01:54:09.084454 1967 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:54:09.084721 kubelet[1967]: I1213 01:54:09.084688 1967 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:54:09.086421 kubelet[1967]: E1213 01:54:09.086108 1967 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.8.19.181099b2a3eb2ed3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.8.19,UID:10.200.8.19,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.8.19,},FirstTimestamp:2024-12-13 01:54:09.070968531 +0000 UTC m=+0.796487390,LastTimestamp:2024-12-13 01:54:09.070968531 +0000 UTC m=+0.796487390,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.8.19,}" Dec 13 01:54:09.087000 audit[1967]: AVC avc: denied { mac_admin } for pid=1967 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:09.087000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:54:09.087000 audit[1967]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000beef30 a1=c0008ebbf0 a2=c000beef00 a3=25 items=0 ppid=1 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.087000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:54:09.087000 audit[1967]: AVC avc: denied { mac_admin } for pid=1967 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:09.087000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:54:09.087000 audit[1967]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc72e0 a1=c0008ebc08 a2=c000beefc0 a3=25 items=0 ppid=1 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.087000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:54:09.088267 kubelet[1967]: I1213 01:54:09.087702 1967 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:54:09.088267 kubelet[1967]: I1213 01:54:09.087747 1967 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:54:09.088267 kubelet[1967]: I1213 01:54:09.087829 1967 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:54:09.093000 audit[1977]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:09.093000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdfdc38750 a2=0 a3=7ffdfdc3873c items=0 ppid=1967 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:54:09.094089 kubelet[1967]: I1213 01:54:09.094067 1967 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 01:54:09.095142 kubelet[1967]: I1213 01:54:09.095121 1967 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 01:54:09.096758 kubelet[1967]: E1213 01:54:09.096739 1967 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:54:09.097000 audit[1978]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:09.097000 audit[1978]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff552d3cf0 a2=0 a3=7fff552d3cdc items=0 ppid=1967 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:54:09.097697 kubelet[1967]: I1213 01:54:09.097672 1967 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:54:09.097697 kubelet[1967]: I1213 01:54:09.097690 1967 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:54:09.097815 kubelet[1967]: I1213 01:54:09.097763 1967 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:54:09.099489 kubelet[1967]: I1213 01:54:09.099474 1967 reconciler.go:26] "Reconciler: start to sync state" Dec 13 01:54:09.100000 audit[1980]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:09.100000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff3d565740 a2=0 a3=7fff3d56572c items=0 ppid=1967 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:54:09.103000 audit[1982]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:09.103000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc14aecf60 a2=0 a3=7ffc14aecf4c items=0 ppid=1967 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:54:09.122319 kubelet[1967]: E1213 01:54:09.121086 1967 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.19\" not found" node="10.200.8.19" Dec 13 01:54:09.129000 audit[1989]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:09.129000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdf0ff5d50 a2=0 a3=7ffdf0ff5d3c items=0 ppid=1967 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 01:54:09.130076 kubelet[1967]: I1213 01:54:09.130022 1967 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:54:09.131322 kubelet[1967]: I1213 01:54:09.131307 1967 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:54:09.131439 kubelet[1967]: I1213 01:54:09.131427 1967 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:54:09.131531 kubelet[1967]: I1213 01:54:09.131521 1967 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:54:09.131000 audit[1991]: NETFILTER_CFG table=mangle:10 family=2 entries=1 op=nft_register_chain pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:09.131000 audit[1991]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfd9361c0 a2=0 a3=7ffdfd9361ac items=0 ppid=1967 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:54:09.132000 audit[1990]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=1990 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:09.132000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffea989d480 a2=0 a3=7ffea989d46c items=0 ppid=1967 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:54:09.133284 kubelet[1967]: I1213 01:54:09.133266 1967 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:54:09.133433 kubelet[1967]: I1213 01:54:09.133421 1967 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:54:09.133511 kubelet[1967]: I1213 01:54:09.133502 1967 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 01:54:09.133624 kubelet[1967]: E1213 01:54:09.133608 1967 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:54:09.134000 audit[1992]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:09.134000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffce5e4c320 a2=0 a3=7ffce5e4c30c items=0 ppid=1967 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:54:09.136000 audit[1993]: NETFILTER_CFG table=mangle:13 family=10 entries=1 op=nft_register_chain pid=1993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:09.136000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff985358c0 a2=0 a3=7fff985358ac items=0 ppid=1967 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:54:09.136000 audit[1995]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:09.136000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc224c86a0 a2=0 a3=7ffc224c868c items=0 ppid=1967 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:54:09.137000 audit[1996]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=1996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:09.137000 audit[1996]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe8388cfd0 a2=0 a3=7ffe8388cfbc items=0 ppid=1967 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:54:09.138130 kubelet[1967]: I1213 01:54:09.138108 1967 policy_none.go:49] "None policy: Start" Dec 13 01:54:09.138767 kubelet[1967]: I1213 01:54:09.138748 1967 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:54:09.138848 kubelet[1967]: I1213 01:54:09.138835 1967 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:54:09.139000 audit[1997]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=1997 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:09.139000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc8f43df60 a2=0 a3=7ffc8f43df4c items=0 ppid=1967 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:54:09.147941 systemd[1]: Created slice kubepods.slice. Dec 13 01:54:09.154195 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 01:54:09.156995 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 01:54:09.163000 audit[1967]: AVC avc: denied { mac_admin } for pid=1967 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:09.163000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:54:09.163000 audit[1967]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b0ee40 a1=c000b3e5e8 a2=c000b0ee10 a3=25 items=0 ppid=1 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:09.163000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:54:09.164500 kubelet[1967]: I1213 01:54:09.164115 1967 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:54:09.164500 kubelet[1967]: I1213 01:54:09.164351 1967 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:54:09.164594 kubelet[1967]: I1213 01:54:09.164483 1967 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 01:54:09.166720 kubelet[1967]: E1213 01:54:09.166493 1967 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.19\" not found" Dec 13 01:54:09.166720 kubelet[1967]: I1213 01:54:09.166705 1967 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:54:09.195411 kubelet[1967]: I1213 01:54:09.195392 1967 kubelet_node_status.go:73] "Attempting to register node" node="10.200.8.19" Dec 13 01:54:09.199856 kubelet[1967]: I1213 01:54:09.199837 1967 kubelet_node_status.go:76] "Successfully registered node" node="10.200.8.19" Dec 13 01:54:09.211166 kubelet[1967]: E1213 01:54:09.211147 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:09.296846 sudo[1835]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:09.296000 audit[1835]: USER_END pid=1835 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:09.296000 audit[1835]: CRED_DISP pid=1835 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:09.311984 kubelet[1967]: E1213 01:54:09.311953 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:09.401040 sshd[1821]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:09.402000 audit[1821]: USER_END pid=1821 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:09.403000 audit[1821]: CRED_DISP pid=1821 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:09.405143 systemd[1]: sshd@6-10.200.8.19:22-10.200.16.10:44264.service: Deactivated successfully. Dec 13 01:54:09.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.19:22-10.200.16.10:44264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:09.406163 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 01:54:09.407014 systemd-logind[1418]: Session 9 logged out. Waiting for processes to exit. Dec 13 01:54:09.408019 systemd-logind[1418]: Removed session 9. Dec 13 01:54:09.412959 kubelet[1967]: E1213 01:54:09.412933 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:09.513755 kubelet[1967]: E1213 01:54:09.513712 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:09.614883 kubelet[1967]: E1213 01:54:09.614829 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:09.715785 kubelet[1967]: E1213 01:54:09.715655 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:09.816777 kubelet[1967]: E1213 01:54:09.816686 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:09.917743 kubelet[1967]: E1213 01:54:09.917650 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:10.018740 kubelet[1967]: E1213 01:54:10.018536 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:10.025985 kubelet[1967]: I1213 01:54:10.025908 1967 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 01:54:10.026365 kubelet[1967]: W1213 01:54:10.026343 1967 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 01:54:10.026444 kubelet[1967]: W1213 01:54:10.026346 1967 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 01:54:10.026444 kubelet[1967]: W1213 01:54:10.026397 1967 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 01:54:10.066546 kubelet[1967]: E1213 01:54:10.066493 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:10.118930 kubelet[1967]: E1213 01:54:10.118885 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:10.219318 kubelet[1967]: E1213 01:54:10.219249 1967 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.19\" not found" Dec 13 01:54:10.321545 kubelet[1967]: I1213 01:54:10.320835 1967 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 01:54:10.321545 kubelet[1967]: I1213 01:54:10.321442 1967 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 01:54:10.322060 env[1436]: time="2024-12-13T01:54:10.321213953Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 01:54:11.067546 kubelet[1967]: E1213 01:54:11.067491 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:11.067768 kubelet[1967]: I1213 01:54:11.067515 1967 apiserver.go:52] "Watching apiserver" Dec 13 01:54:11.072722 kubelet[1967]: I1213 01:54:11.072681 1967 topology_manager.go:215] "Topology Admit Handler" podUID="5734fb2d-d9c0-4ca1-8667-060d4953f23c" podNamespace="calico-system" podName="calico-node-qx49s" Dec 13 01:54:11.072890 kubelet[1967]: I1213 01:54:11.072798 1967 topology_manager.go:215] "Topology Admit Handler" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" podNamespace="calico-system" podName="csi-node-driver-tw8wx" Dec 13 01:54:11.072890 kubelet[1967]: I1213 01:54:11.072888 1967 topology_manager.go:215] "Topology Admit Handler" podUID="f0c74167-cc6f-4729-8be8-b2f62a4806ec" podNamespace="kube-system" podName="kube-proxy-6qlpw" Dec 13 01:54:11.074853 kubelet[1967]: E1213 01:54:11.074813 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tw8wx" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" Dec 13 01:54:11.081063 systemd[1]: Created slice kubepods-besteffort-podf0c74167_cc6f_4729_8be8_b2f62a4806ec.slice. Dec 13 01:54:11.092031 systemd[1]: Created slice kubepods-besteffort-pod5734fb2d_d9c0_4ca1_8667_060d4953f23c.slice. Dec 13 01:54:11.096193 kubelet[1967]: I1213 01:54:11.096168 1967 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 01:54:11.113726 kubelet[1967]: I1213 01:54:11.113688 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5734fb2d-d9c0-4ca1-8667-060d4953f23c-cni-log-dir\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.113840 kubelet[1967]: I1213 01:54:11.113728 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nd266\" (UniqueName: \"kubernetes.io/projected/5734fb2d-d9c0-4ca1-8667-060d4953f23c-kube-api-access-nd266\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.113840 kubelet[1967]: I1213 01:54:11.113754 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f0c74167-cc6f-4729-8be8-b2f62a4806ec-kube-proxy\") pod \"kube-proxy-6qlpw\" (UID: \"f0c74167-cc6f-4729-8be8-b2f62a4806ec\") " pod="kube-system/kube-proxy-6qlpw" Dec 13 01:54:11.113840 kubelet[1967]: I1213 01:54:11.113774 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f0c74167-cc6f-4729-8be8-b2f62a4806ec-xtables-lock\") pod \"kube-proxy-6qlpw\" (UID: \"f0c74167-cc6f-4729-8be8-b2f62a4806ec\") " pod="kube-system/kube-proxy-6qlpw" Dec 13 01:54:11.113840 kubelet[1967]: I1213 01:54:11.113796 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5734fb2d-d9c0-4ca1-8667-060d4953f23c-cni-bin-dir\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.113840 kubelet[1967]: I1213 01:54:11.113815 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5734fb2d-d9c0-4ca1-8667-060d4953f23c-cni-net-dir\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.114055 kubelet[1967]: I1213 01:54:11.113837 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5734fb2d-d9c0-4ca1-8667-060d4953f23c-tigera-ca-bundle\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.114055 kubelet[1967]: I1213 01:54:11.113857 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5734fb2d-d9c0-4ca1-8667-060d4953f23c-var-lib-calico\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.114055 kubelet[1967]: I1213 01:54:11.113880 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5734fb2d-d9c0-4ca1-8667-060d4953f23c-flexvol-driver-host\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.114055 kubelet[1967]: I1213 01:54:11.113902 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4f8f1613-73c8-4ce1-870f-3681b1103b18-kubelet-dir\") pod \"csi-node-driver-tw8wx\" (UID: \"4f8f1613-73c8-4ce1-870f-3681b1103b18\") " pod="calico-system/csi-node-driver-tw8wx" Dec 13 01:54:11.114055 kubelet[1967]: I1213 01:54:11.113923 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5734fb2d-d9c0-4ca1-8667-060d4953f23c-xtables-lock\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.114253 kubelet[1967]: I1213 01:54:11.113943 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5734fb2d-d9c0-4ca1-8667-060d4953f23c-policysync\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.114253 kubelet[1967]: I1213 01:54:11.113963 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5734fb2d-d9c0-4ca1-8667-060d4953f23c-lib-modules\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.114253 kubelet[1967]: I1213 01:54:11.113987 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4f8f1613-73c8-4ce1-870f-3681b1103b18-registration-dir\") pod \"csi-node-driver-tw8wx\" (UID: \"4f8f1613-73c8-4ce1-870f-3681b1103b18\") " pod="calico-system/csi-node-driver-tw8wx" Dec 13 01:54:11.114253 kubelet[1967]: I1213 01:54:11.114009 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4f8f1613-73c8-4ce1-870f-3681b1103b18-varrun\") pod \"csi-node-driver-tw8wx\" (UID: \"4f8f1613-73c8-4ce1-870f-3681b1103b18\") " pod="calico-system/csi-node-driver-tw8wx" Dec 13 01:54:11.114253 kubelet[1967]: I1213 01:54:11.114060 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4f8f1613-73c8-4ce1-870f-3681b1103b18-socket-dir\") pod \"csi-node-driver-tw8wx\" (UID: \"4f8f1613-73c8-4ce1-870f-3681b1103b18\") " pod="calico-system/csi-node-driver-tw8wx" Dec 13 01:54:11.114477 kubelet[1967]: I1213 01:54:11.114084 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4rgc5\" (UniqueName: \"kubernetes.io/projected/4f8f1613-73c8-4ce1-870f-3681b1103b18-kube-api-access-4rgc5\") pod \"csi-node-driver-tw8wx\" (UID: \"4f8f1613-73c8-4ce1-870f-3681b1103b18\") " pod="calico-system/csi-node-driver-tw8wx" Dec 13 01:54:11.114477 kubelet[1967]: I1213 01:54:11.114111 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f0c74167-cc6f-4729-8be8-b2f62a4806ec-lib-modules\") pod \"kube-proxy-6qlpw\" (UID: \"f0c74167-cc6f-4729-8be8-b2f62a4806ec\") " pod="kube-system/kube-proxy-6qlpw" Dec 13 01:54:11.114477 kubelet[1967]: I1213 01:54:11.114134 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9cqd7\" (UniqueName: \"kubernetes.io/projected/f0c74167-cc6f-4729-8be8-b2f62a4806ec-kube-api-access-9cqd7\") pod \"kube-proxy-6qlpw\" (UID: \"f0c74167-cc6f-4729-8be8-b2f62a4806ec\") " pod="kube-system/kube-proxy-6qlpw" Dec 13 01:54:11.114477 kubelet[1967]: I1213 01:54:11.114156 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5734fb2d-d9c0-4ca1-8667-060d4953f23c-node-certs\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.114477 kubelet[1967]: I1213 01:54:11.114178 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5734fb2d-d9c0-4ca1-8667-060d4953f23c-var-run-calico\") pod \"calico-node-qx49s\" (UID: \"5734fb2d-d9c0-4ca1-8667-060d4953f23c\") " pod="calico-system/calico-node-qx49s" Dec 13 01:54:11.219533 kubelet[1967]: E1213 01:54:11.219500 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:11.219751 kubelet[1967]: W1213 01:54:11.219731 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:11.219920 kubelet[1967]: E1213 01:54:11.219899 1967 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:11.240428 kubelet[1967]: E1213 01:54:11.240400 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:11.240428 kubelet[1967]: W1213 01:54:11.240423 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:11.240632 kubelet[1967]: E1213 01:54:11.240444 1967 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:11.240680 kubelet[1967]: E1213 01:54:11.240656 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:11.240680 kubelet[1967]: W1213 01:54:11.240667 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:11.240763 kubelet[1967]: E1213 01:54:11.240681 1967 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:11.241276 kubelet[1967]: E1213 01:54:11.241252 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:11.241276 kubelet[1967]: W1213 01:54:11.241272 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:11.241458 kubelet[1967]: E1213 01:54:11.241287 1967 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:11.247501 kubelet[1967]: E1213 01:54:11.247486 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:11.247599 kubelet[1967]: W1213 01:54:11.247586 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:11.247736 kubelet[1967]: E1213 01:54:11.247717 1967 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:11.390955 env[1436]: time="2024-12-13T01:54:11.390914528Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6qlpw,Uid:f0c74167-cc6f-4729-8be8-b2f62a4806ec,Namespace:kube-system,Attempt:0,}" Dec 13 01:54:11.398083 env[1436]: time="2024-12-13T01:54:11.398049959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qx49s,Uid:5734fb2d-d9c0-4ca1-8667-060d4953f23c,Namespace:calico-system,Attempt:0,}" Dec 13 01:54:12.068707 kubelet[1967]: E1213 01:54:12.068665 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:13.069055 kubelet[1967]: E1213 01:54:13.068983 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:13.134996 kubelet[1967]: E1213 01:54:13.134543 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tw8wx" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" Dec 13 01:54:14.069549 kubelet[1967]: E1213 01:54:14.069491 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:14.534323 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount191918515.mount: Deactivated successfully. Dec 13 01:54:14.560806 env[1436]: time="2024-12-13T01:54:14.560697731Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:14.574281 env[1436]: time="2024-12-13T01:54:14.574242535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:14.578013 env[1436]: time="2024-12-13T01:54:14.577973546Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:14.587154 env[1436]: time="2024-12-13T01:54:14.587120019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:14.589576 env[1436]: time="2024-12-13T01:54:14.589542991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:14.596104 env[1436]: time="2024-12-13T01:54:14.596064485Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:14.605508 env[1436]: time="2024-12-13T01:54:14.605469866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:14.606016 env[1436]: time="2024-12-13T01:54:14.605988081Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:14.655597 env[1436]: time="2024-12-13T01:54:14.654755835Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:54:14.655597 env[1436]: time="2024-12-13T01:54:14.654802837Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:54:14.655597 env[1436]: time="2024-12-13T01:54:14.654813137Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:54:14.655597 env[1436]: time="2024-12-13T01:54:14.655023643Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/baa89f913334d9f87c8e5c91cd933cbec3522bfb0ce75e6acce1077bebba78a2 pid=2018 runtime=io.containerd.runc.v2 Dec 13 01:54:14.675817 env[1436]: time="2024-12-13T01:54:14.675755261Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:54:14.675966 env[1436]: time="2024-12-13T01:54:14.675797763Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:54:14.675966 env[1436]: time="2024-12-13T01:54:14.675812563Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:54:14.676155 env[1436]: time="2024-12-13T01:54:14.676120272Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ead19be9f353f29c94745ee3ea8901f8bed32a207254328bed4fb48b0ee6d0b3 pid=2036 runtime=io.containerd.runc.v2 Dec 13 01:54:14.689232 systemd[1]: Started cri-containerd-baa89f913334d9f87c8e5c91cd933cbec3522bfb0ce75e6acce1077bebba78a2.scope. Dec 13 01:54:14.704425 systemd[1]: Started cri-containerd-ead19be9f353f29c94745ee3ea8901f8bed32a207254328bed4fb48b0ee6d0b3.scope. Dec 13 01:54:14.728342 kernel: kauditd_printk_skb: 222 callbacks suppressed Dec 13 01:54:14.728448 kernel: audit: type=1400 audit(1734054854.711:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754562 kernel: audit: type=1400 audit(1734054854.711:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754661 kernel: audit: type=1400 audit(1734054854.711:424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.788472 kernel: audit: type=1400 audit(1734054854.711:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.788555 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 01:54:14.788581 kernel: audit: type=1400 audit(1734054854.711:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.788604 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 01:54:14.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.808347 kernel: audit: type=1400 audit(1734054854.711:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.808423 kernel: audit: backlog limit exceeded Dec 13 01:54:14.808449 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 01:54:14.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit: BPF prog-id=56 op=LOAD Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613839663931333333346439663837633865356339316364393333 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613839663931333333346439663837633865356339316364393333 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.741000 audit: BPF prog-id=57 op=LOAD Dec 13 01:54:14.741000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000097020 items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613839663931333333346439663837633865356339316364393333 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit: BPF prog-id=58 op=LOAD Dec 13 01:54:14.754000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000097068 items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613839663931333333346439663837633865356339316364393333 Dec 13 01:54:14.754000 audit: BPF prog-id=58 op=UNLOAD Dec 13 01:54:14.754000 audit: BPF prog-id=57 op=UNLOAD Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.754000 audit: BPF prog-id=59 op=LOAD Dec 13 01:54:14.754000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000097478 items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613839663931333333346439663837633865356339316364393333 Dec 13 01:54:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.814000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.814000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2036 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643139626539663335336632396339343734356565336561383930 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2036 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643139626539663335336632396339343734356565336561383930 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit: BPF prog-id=61 op=LOAD Dec 13 01:54:14.816000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024f40 items=0 ppid=2036 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643139626539663335336632396339343734356565336561383930 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit: BPF prog-id=62 op=LOAD Dec 13 01:54:14.816000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024f88 items=0 ppid=2036 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643139626539663335336632396339343734356565336561383930 Dec 13 01:54:14.816000 audit: BPF prog-id=62 op=UNLOAD Dec 13 01:54:14.816000 audit: BPF prog-id=61 op=UNLOAD Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:14.816000 audit: BPF prog-id=63 op=LOAD Dec 13 01:54:14.816000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025398 items=0 ppid=2036 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:14.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643139626539663335336632396339343734356565336561383930 Dec 13 01:54:14.833752 env[1436]: time="2024-12-13T01:54:14.833709271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qx49s,Uid:5734fb2d-d9c0-4ca1-8667-060d4953f23c,Namespace:calico-system,Attempt:0,} returns sandbox id \"baa89f913334d9f87c8e5c91cd933cbec3522bfb0ce75e6acce1077bebba78a2\"" Dec 13 01:54:14.836280 env[1436]: time="2024-12-13T01:54:14.836246947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 01:54:14.839597 env[1436]: time="2024-12-13T01:54:14.839566646Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6qlpw,Uid:f0c74167-cc6f-4729-8be8-b2f62a4806ec,Namespace:kube-system,Attempt:0,} returns sandbox id \"ead19be9f353f29c94745ee3ea8901f8bed32a207254328bed4fb48b0ee6d0b3\"" Dec 13 01:54:15.070284 kubelet[1967]: E1213 01:54:15.070148 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:15.134347 kubelet[1967]: E1213 01:54:15.134278 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tw8wx" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" Dec 13 01:54:16.060067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4134538591.mount: Deactivated successfully. Dec 13 01:54:16.071217 kubelet[1967]: E1213 01:54:16.071176 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:16.231019 env[1436]: time="2024-12-13T01:54:16.230959162Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:16.237681 env[1436]: time="2024-12-13T01:54:16.237640951Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:16.242240 env[1436]: time="2024-12-13T01:54:16.242209479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:16.245703 env[1436]: time="2024-12-13T01:54:16.245669977Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:16.246124 env[1436]: time="2024-12-13T01:54:16.246095189Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 01:54:16.247827 env[1436]: time="2024-12-13T01:54:16.247801737Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 01:54:16.248632 env[1436]: time="2024-12-13T01:54:16.248598060Z" level=info msg="CreateContainer within sandbox \"baa89f913334d9f87c8e5c91cd933cbec3522bfb0ce75e6acce1077bebba78a2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 01:54:16.276291 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2356270182.mount: Deactivated successfully. Dec 13 01:54:16.290921 env[1436]: time="2024-12-13T01:54:16.290874153Z" level=info msg="CreateContainer within sandbox \"baa89f913334d9f87c8e5c91cd933cbec3522bfb0ce75e6acce1077bebba78a2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"cd0435488c41cedf98078512611cdcccc626a2f684219907e9b61ccd884479c4\"" Dec 13 01:54:16.291485 env[1436]: time="2024-12-13T01:54:16.291452470Z" level=info msg="StartContainer for \"cd0435488c41cedf98078512611cdcccc626a2f684219907e9b61ccd884479c4\"" Dec 13 01:54:16.308872 systemd[1]: Started cri-containerd-cd0435488c41cedf98078512611cdcccc626a2f684219907e9b61ccd884479c4.scope. Dec 13 01:54:16.323000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.323000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f413972bc38 items=0 ppid=2018 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:16.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303433353438386334316365646639383037383531323631316364 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit: BPF prog-id=64 op=LOAD Dec 13 01:54:16.324000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000312fe8 items=0 ppid=2018 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:16.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303433353438386334316365646639383037383531323631316364 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit: BPF prog-id=65 op=LOAD Dec 13 01:54:16.324000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000313038 items=0 ppid=2018 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:16.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303433353438386334316365646639383037383531323631316364 Dec 13 01:54:16.324000 audit: BPF prog-id=65 op=UNLOAD Dec 13 01:54:16.324000 audit: BPF prog-id=64 op=UNLOAD Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:16.324000 audit: BPF prog-id=66 op=LOAD Dec 13 01:54:16.324000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003130c8 items=0 ppid=2018 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:16.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303433353438386334316365646639383037383531323631316364 Dec 13 01:54:16.345447 env[1436]: time="2024-12-13T01:54:16.345407193Z" level=info msg="StartContainer for \"cd0435488c41cedf98078512611cdcccc626a2f684219907e9b61ccd884479c4\" returns successfully" Dec 13 01:54:16.349699 systemd[1]: cri-containerd-cd0435488c41cedf98078512611cdcccc626a2f684219907e9b61ccd884479c4.scope: Deactivated successfully. Dec 13 01:54:16.352000 audit: BPF prog-id=66 op=UNLOAD Dec 13 01:54:16.541985 env[1436]: time="2024-12-13T01:54:16.541899739Z" level=info msg="shim disconnected" id=cd0435488c41cedf98078512611cdcccc626a2f684219907e9b61ccd884479c4 Dec 13 01:54:16.541985 env[1436]: time="2024-12-13T01:54:16.541981942Z" level=warning msg="cleaning up after shim disconnected" id=cd0435488c41cedf98078512611cdcccc626a2f684219907e9b61ccd884479c4 namespace=k8s.io Dec 13 01:54:16.542323 env[1436]: time="2024-12-13T01:54:16.541996842Z" level=info msg="cleaning up dead shim" Dec 13 01:54:16.551250 env[1436]: time="2024-12-13T01:54:16.551199102Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:54:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2138 runtime=io.containerd.runc.v2\n" Dec 13 01:54:17.071786 kubelet[1967]: E1213 01:54:17.071707 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:17.135983 kubelet[1967]: E1213 01:54:17.135932 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tw8wx" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" Dec 13 01:54:17.473764 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3944819131.mount: Deactivated successfully. Dec 13 01:54:18.072426 kubelet[1967]: E1213 01:54:18.072375 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:18.074292 env[1436]: time="2024-12-13T01:54:18.074251831Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:18.080262 env[1436]: time="2024-12-13T01:54:18.080227790Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:18.083802 env[1436]: time="2024-12-13T01:54:18.083710484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:18.086856 env[1436]: time="2024-12-13T01:54:18.086825867Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:18.087197 env[1436]: time="2024-12-13T01:54:18.087167376Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 01:54:18.089028 env[1436]: time="2024-12-13T01:54:18.088580014Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 01:54:18.089870 env[1436]: time="2024-12-13T01:54:18.089843248Z" level=info msg="CreateContainer within sandbox \"ead19be9f353f29c94745ee3ea8901f8bed32a207254328bed4fb48b0ee6d0b3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 01:54:18.124834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2456682844.mount: Deactivated successfully. Dec 13 01:54:18.143738 env[1436]: time="2024-12-13T01:54:18.143701388Z" level=info msg="CreateContainer within sandbox \"ead19be9f353f29c94745ee3ea8901f8bed32a207254328bed4fb48b0ee6d0b3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0c0dd0d47c77ba1e18b84a486a1b308d681c27f17234afb768a99d5b5f785f8d\"" Dec 13 01:54:18.144362 env[1436]: time="2024-12-13T01:54:18.144334105Z" level=info msg="StartContainer for \"0c0dd0d47c77ba1e18b84a486a1b308d681c27f17234afb768a99d5b5f785f8d\"" Dec 13 01:54:18.164440 systemd[1]: Started cri-containerd-0c0dd0d47c77ba1e18b84a486a1b308d681c27f17234afb768a99d5b5f785f8d.scope. Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fde044aa5b8 items=0 ppid=2036 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063306464306434376337376261316531386238346134383661316233 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit: BPF prog-id=67 op=LOAD Dec 13 01:54:18.184000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003ea2c8 items=0 ppid=2036 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063306464306434376337376261316531386238346134383661316233 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.184000 audit: BPF prog-id=68 op=LOAD Dec 13 01:54:18.184000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003ea318 items=0 ppid=2036 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063306464306434376337376261316531386238346134383661316233 Dec 13 01:54:18.184000 audit: BPF prog-id=68 op=UNLOAD Dec 13 01:54:18.185000 audit: BPF prog-id=67 op=UNLOAD Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:18.185000 audit: BPF prog-id=69 op=LOAD Dec 13 01:54:18.185000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ea3a8 items=0 ppid=2036 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063306464306434376337376261316531386238346134383661316233 Dec 13 01:54:18.210800 env[1436]: time="2024-12-13T01:54:18.210761781Z" level=info msg="StartContainer for \"0c0dd0d47c77ba1e18b84a486a1b308d681c27f17234afb768a99d5b5f785f8d\" returns successfully" Dec 13 01:54:18.260000 audit[2212]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.260000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc13f7230 a2=0 a3=7ffcc13f721c items=0 ppid=2172 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:54:18.263000 audit[2213]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.263000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf235f430 a2=0 a3=7ffdf235f41c items=0 ppid=2172 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:54:18.264000 audit[2214]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.264000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeda6cdaa0 a2=0 a3=7ffeda6cda8c items=0 ppid=2172 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:54:18.265000 audit[2216]: NETFILTER_CFG table=nat:20 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.265000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd36d54b30 a2=0 a3=7ffd36d54b1c items=0 ppid=2172 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:54:18.267000 audit[2217]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.267000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4bdc6640 a2=0 a3=7ffd4bdc662c items=0 ppid=2172 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:54:18.267000 audit[2218]: NETFILTER_CFG table=filter:22 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.267000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7f7c4840 a2=0 a3=7fff7f7c482c items=0 ppid=2172 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:54:18.363000 audit[2219]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.363000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdfc39e4d0 a2=0 a3=7ffdfc39e4bc items=0 ppid=2172 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:54:18.367000 audit[2221]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.367000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc505e4ea0 a2=0 a3=7ffc505e4e8c items=0 ppid=2172 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 01:54:18.370000 audit[2224]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.370000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffed9db82d0 a2=0 a3=7ffed9db82bc items=0 ppid=2172 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 01:54:18.371000 audit[2225]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.371000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe0d20540 a2=0 a3=7fffe0d2052c items=0 ppid=2172 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:54:18.374000 audit[2227]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.374000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff72134030 a2=0 a3=7fff7213401c items=0 ppid=2172 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:54:18.375000 audit[2228]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.375000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6e1b8420 a2=0 a3=7ffc6e1b840c items=0 ppid=2172 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:54:18.377000 audit[2230]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.377000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffef8deded0 a2=0 a3=7ffef8dedebc items=0 ppid=2172 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:54:18.381000 audit[2233]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.381000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe921f99d0 a2=0 a3=7ffe921f99bc items=0 ppid=2172 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 01:54:18.382000 audit[2234]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.382000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc792cecd0 a2=0 a3=7ffc792cecbc items=0 ppid=2172 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:54:18.384000 audit[2236]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.384000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed737ec30 a2=0 a3=7ffed737ec1c items=0 ppid=2172 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:54:18.385000 audit[2237]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.385000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1342e450 a2=0 a3=7ffd1342e43c items=0 ppid=2172 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:54:18.388000 audit[2239]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.388000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfc0f4d20 a2=0 a3=7ffdfc0f4d0c items=0 ppid=2172 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:54:18.392000 audit[2242]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.392000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff29d26150 a2=0 a3=7fff29d2613c items=0 ppid=2172 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:54:18.395000 audit[2245]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.395000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1afa4860 a2=0 a3=7ffc1afa484c items=0 ppid=2172 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:54:18.396000 audit[2246]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.396000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffddc822400 a2=0 a3=7ffddc8223ec items=0 ppid=2172 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.396000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:54:18.399000 audit[2248]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.399000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe6cd0e8c0 a2=0 a3=7ffe6cd0e8ac items=0 ppid=2172 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:54:18.465000 audit[2253]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.465000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe81462d30 a2=0 a3=7ffe81462d1c items=0 ppid=2172 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:54:18.466000 audit[2254]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.466000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc58139b0 a2=0 a3=7fffc581399c items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:54:18.468000 audit[2256]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:18.468000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffed34b7930 a2=0 a3=7ffed34b791c items=0 ppid=2172 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:54:18.498000 audit[2262]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:18.498000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd0991fce0 a2=0 a3=7ffd0991fccc items=0 ppid=2172 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:18.574000 audit[2262]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:18.574000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffd0991fce0 a2=0 a3=7ffd0991fccc items=0 ppid=2172 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:18.627000 audit[2270]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.627000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0be97f30 a2=0 a3=7ffd0be97f1c items=0 ppid=2172 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.627000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:54:18.632000 audit[2272]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.632000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe5129ff00 a2=0 a3=7ffe5129feec items=0 ppid=2172 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 01:54:18.635000 audit[2275]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.635000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc7371b70 a2=0 a3=7ffcc7371b5c items=0 ppid=2172 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 01:54:18.637000 audit[2276]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.637000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcab1f0f10 a2=0 a3=7ffcab1f0efc items=0 ppid=2172 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:54:18.639000 audit[2278]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.639000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee6f86c50 a2=0 a3=7ffee6f86c3c items=0 ppid=2172 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:54:18.640000 audit[2279]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.640000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff56278bc0 a2=0 a3=7fff56278bac items=0 ppid=2172 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:54:18.643000 audit[2281]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.643000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe6b9c4550 a2=0 a3=7ffe6b9c453c items=0 ppid=2172 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 01:54:18.646000 audit[2284]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.646000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc9f0ae330 a2=0 a3=7ffc9f0ae31c items=0 ppid=2172 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:54:18.647000 audit[2285]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.647000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe779cf6f0 a2=0 a3=7ffe779cf6dc items=0 ppid=2172 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:54:18.649000 audit[2287]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.649000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe0713050 a2=0 a3=7fffe071303c items=0 ppid=2172 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:54:18.650000 audit[2288]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.650000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb8730de0 a2=0 a3=7ffcb8730dcc items=0 ppid=2172 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:54:18.654000 audit[2290]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.654000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0e614580 a2=0 a3=7fff0e61456c items=0 ppid=2172 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:54:18.660000 audit[2293]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.660000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1b419660 a2=0 a3=7ffc1b41964c items=0 ppid=2172 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:54:18.664000 audit[2296]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.664000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe74fe0ac0 a2=0 a3=7ffe74fe0aac items=0 ppid=2172 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 01:54:18.665000 audit[2297]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.665000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeffc699e0 a2=0 a3=7ffeffc699cc items=0 ppid=2172 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:54:18.667000 audit[2299]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.667000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdb223c3a0 a2=0 a3=7ffdb223c38c items=0 ppid=2172 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:54:18.671000 audit[2302]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.671000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd8b88da00 a2=0 a3=7ffd8b88d9ec items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:54:18.672000 audit[2303]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.672000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5d2ac590 a2=0 a3=7ffd5d2ac57c items=0 ppid=2172 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:54:18.674000 audit[2305]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.674000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff4a78e670 a2=0 a3=7fff4a78e65c items=0 ppid=2172 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:54:18.675000 audit[2306]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.675000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc86a4ed0 a2=0 a3=7fffc86a4ebc items=0 ppid=2172 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:54:18.678000 audit[2308]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.678000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff6d91a110 a2=0 a3=7fff6d91a0fc items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:54:18.681000 audit[2311]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:18.681000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb8e42440 a2=0 a3=7ffdb8e4242c items=0 ppid=2172 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:54:18.684000 audit[2313]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:54:18.684000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff120fd410 a2=0 a3=7fff120fd3fc items=0 ppid=2172 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.684000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:18.684000 audit[2313]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:54:18.684000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff120fd410 a2=0 a3=7fff120fd3fc items=0 ppid=2172 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:18.684000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:19.073276 kubelet[1967]: E1213 01:54:19.073146 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:19.134668 kubelet[1967]: E1213 01:54:19.134315 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tw8wx" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" Dec 13 01:54:20.077108 kubelet[1967]: E1213 01:54:20.077068 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:21.077890 kubelet[1967]: E1213 01:54:21.077824 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:21.136029 kubelet[1967]: E1213 01:54:21.135111 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tw8wx" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" Dec 13 01:54:22.078136 kubelet[1967]: E1213 01:54:22.078063 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:22.281248 env[1436]: time="2024-12-13T01:54:22.281194695Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:22.289077 env[1436]: time="2024-12-13T01:54:22.289022684Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:22.293075 env[1436]: time="2024-12-13T01:54:22.293047080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:22.297927 env[1436]: time="2024-12-13T01:54:22.297896497Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:22.298246 env[1436]: time="2024-12-13T01:54:22.298214204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 01:54:22.300788 env[1436]: time="2024-12-13T01:54:22.300762466Z" level=info msg="CreateContainer within sandbox \"baa89f913334d9f87c8e5c91cd933cbec3522bfb0ce75e6acce1077bebba78a2\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 01:54:22.324789 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount690783024.mount: Deactivated successfully. Dec 13 01:54:22.345430 env[1436]: time="2024-12-13T01:54:22.344814724Z" level=info msg="CreateContainer within sandbox \"baa89f913334d9f87c8e5c91cd933cbec3522bfb0ce75e6acce1077bebba78a2\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a7dc645d33a89038e9a1a9e96c91ff089fac58686d60d5ea86757c46a80b0514\"" Dec 13 01:54:22.345720 env[1436]: time="2024-12-13T01:54:22.345691445Z" level=info msg="StartContainer for \"a7dc645d33a89038e9a1a9e96c91ff089fac58686d60d5ea86757c46a80b0514\"" Dec 13 01:54:22.371030 systemd[1]: Started cri-containerd-a7dc645d33a89038e9a1a9e96c91ff089fac58686d60d5ea86757c46a80b0514.scope. Dec 13 01:54:22.403341 kernel: kauditd_printk_skb: 348 callbacks suppressed Dec 13 01:54:22.403499 kernel: audit: type=1400 audit(1734054862.384:520): avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f7aab3b97e8 items=0 ppid=2018 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:22.422767 kernel: audit: type=1300 audit(1734054862.384:520): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f7aab3b97e8 items=0 ppid=2018 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:22.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646336343564333361383930333865396131613965393663393166 Dec 13 01:54:22.458443 kernel: audit: type=1327 audit(1734054862.384:520): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646336343564333361383930333865396131613965393663393166 Dec 13 01:54:22.458556 kernel: audit: type=1400 audit(1734054862.384:521): avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.470828 kernel: audit: type=1400 audit(1734054862.384:521): avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.470906 kernel: audit: type=1400 audit(1734054862.384:521): avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.472141 env[1436]: time="2024-12-13T01:54:22.472105683Z" level=info msg="StartContainer for \"a7dc645d33a89038e9a1a9e96c91ff089fac58686d60d5ea86757c46a80b0514\" returns successfully" Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.494920 kernel: audit: type=1400 audit(1734054862.384:521): avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.495547 kernel: audit: type=1400 audit(1734054862.384:521): avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.535253 kernel: audit: type=1400 audit(1734054862.384:521): avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.535344 kernel: audit: type=1400 audit(1734054862.384:521): avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.384000 audit: BPF prog-id=70 op=LOAD Dec 13 01:54:22.384000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00033c048 items=0 ppid=2018 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:22.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646336343564333361383930333865396131613965393663393166 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit: BPF prog-id=71 op=LOAD Dec 13 01:54:22.402000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00033c098 items=0 ppid=2018 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:22.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646336343564333361383930333865396131613965393663393166 Dec 13 01:54:22.402000 audit: BPF prog-id=71 op=UNLOAD Dec 13 01:54:22.402000 audit: BPF prog-id=70 op=UNLOAD Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:22.402000 audit: BPF prog-id=72 op=LOAD Dec 13 01:54:22.402000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00033c128 items=0 ppid=2018 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:22.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646336343564333361383930333865396131613965393663393166 Dec 13 01:54:23.078507 kubelet[1967]: E1213 01:54:23.078454 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:23.134638 kubelet[1967]: E1213 01:54:23.134580 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tw8wx" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" Dec 13 01:54:23.196389 kubelet[1967]: I1213 01:54:23.196320 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6qlpw" podStartSLOduration=10.948768445 podStartE2EDuration="14.196286369s" podCreationTimestamp="2024-12-13 01:54:09 +0000 UTC" firstStartedPulling="2024-12-13 01:54:14.840881085 +0000 UTC m=+6.566406644" lastFinishedPulling="2024-12-13 01:54:18.088405809 +0000 UTC m=+9.813924568" observedRunningTime="2024-12-13 01:54:19.181898721 +0000 UTC m=+10.907417480" watchObservedRunningTime="2024-12-13 01:54:23.196286369 +0000 UTC m=+14.921805228" Dec 13 01:54:23.977854 env[1436]: time="2024-12-13T01:54:23.977759660Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:54:23.979633 systemd[1]: cri-containerd-a7dc645d33a89038e9a1a9e96c91ff089fac58686d60d5ea86757c46a80b0514.scope: Deactivated successfully. Dec 13 01:54:23.982000 audit: BPF prog-id=72 op=UNLOAD Dec 13 01:54:23.997824 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a7dc645d33a89038e9a1a9e96c91ff089fac58686d60d5ea86757c46a80b0514-rootfs.mount: Deactivated successfully. Dec 13 01:54:24.069776 kubelet[1967]: I1213 01:54:24.068936 1967 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 01:54:24.248142 kubelet[1967]: E1213 01:54:24.079345 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:25.080406 kubelet[1967]: E1213 01:54:25.080343 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:25.139970 systemd[1]: Created slice kubepods-besteffort-pod4f8f1613_73c8_4ce1_870f_3681b1103b18.slice. Dec 13 01:54:25.142683 env[1436]: time="2024-12-13T01:54:25.142645852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tw8wx,Uid:4f8f1613-73c8-4ce1-870f-3681b1103b18,Namespace:calico-system,Attempt:0,}" Dec 13 01:54:26.081145 kubelet[1967]: E1213 01:54:26.081076 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:26.415485 env[1436]: time="2024-12-13T01:54:26.415339493Z" level=info msg="shim disconnected" id=a7dc645d33a89038e9a1a9e96c91ff089fac58686d60d5ea86757c46a80b0514 Dec 13 01:54:26.415970 env[1436]: time="2024-12-13T01:54:26.415930705Z" level=warning msg="cleaning up after shim disconnected" id=a7dc645d33a89038e9a1a9e96c91ff089fac58686d60d5ea86757c46a80b0514 namespace=k8s.io Dec 13 01:54:26.415970 env[1436]: time="2024-12-13T01:54:26.415958206Z" level=info msg="cleaning up dead shim" Dec 13 01:54:26.425981 env[1436]: time="2024-12-13T01:54:26.425946822Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:54:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2360 runtime=io.containerd.runc.v2\n" Dec 13 01:54:26.502221 env[1436]: time="2024-12-13T01:54:26.502156272Z" level=error msg="Failed to destroy network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:26.507023 env[1436]: time="2024-12-13T01:54:26.506965876Z" level=error msg="encountered an error cleaning up failed sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:26.507240 env[1436]: time="2024-12-13T01:54:26.507196181Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tw8wx,Uid:4f8f1613-73c8-4ce1-870f-3681b1103b18,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:26.508070 kubelet[1967]: E1213 01:54:26.507596 1967 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:26.508070 kubelet[1967]: E1213 01:54:26.507681 1967 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tw8wx" Dec 13 01:54:26.508070 kubelet[1967]: E1213 01:54:26.507712 1967 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tw8wx" Dec 13 01:54:26.508265 kubelet[1967]: E1213 01:54:26.507763 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tw8wx_calico-system(4f8f1613-73c8-4ce1-870f-3681b1103b18)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tw8wx_calico-system(4f8f1613-73c8-4ce1-870f-3681b1103b18)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tw8wx" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" Dec 13 01:54:26.508364 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d-shm.mount: Deactivated successfully. Dec 13 01:54:27.081517 kubelet[1967]: E1213 01:54:27.081407 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:27.187700 env[1436]: time="2024-12-13T01:54:27.187652516Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 01:54:27.187902 kubelet[1967]: I1213 01:54:27.187802 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:54:27.188673 env[1436]: time="2024-12-13T01:54:27.188633436Z" level=info msg="StopPodSandbox for \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\"" Dec 13 01:54:27.214676 env[1436]: time="2024-12-13T01:54:27.214624084Z" level=error msg="StopPodSandbox for \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\" failed" error="failed to destroy network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:27.214951 kubelet[1967]: E1213 01:54:27.214906 1967 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:54:27.215060 kubelet[1967]: E1213 01:54:27.214970 1967 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d"} Dec 13 01:54:27.215060 kubelet[1967]: E1213 01:54:27.215032 1967 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4f8f1613-73c8-4ce1-870f-3681b1103b18\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:54:27.215165 kubelet[1967]: E1213 01:54:27.215058 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4f8f1613-73c8-4ce1-870f-3681b1103b18\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tw8wx" podUID="4f8f1613-73c8-4ce1-870f-3681b1103b18" Dec 13 01:54:28.082580 kubelet[1967]: E1213 01:54:28.082528 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:29.064449 kubelet[1967]: E1213 01:54:29.064385 1967 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:29.082922 kubelet[1967]: E1213 01:54:29.082875 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:30.083551 kubelet[1967]: E1213 01:54:30.083507 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:30.559365 kubelet[1967]: I1213 01:54:30.558536 1967 topology_manager.go:215] "Topology Admit Handler" podUID="4e913986-999f-44b8-bb55-12d64d75cc5f" podNamespace="default" podName="nginx-deployment-85f456d6dd-9cfrv" Dec 13 01:54:30.564730 systemd[1]: Created slice kubepods-besteffort-pod4e913986_999f_44b8_bb55_12d64d75cc5f.slice. Dec 13 01:54:30.652609 kubelet[1967]: I1213 01:54:30.652563 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z99nz\" (UniqueName: \"kubernetes.io/projected/4e913986-999f-44b8-bb55-12d64d75cc5f-kube-api-access-z99nz\") pod \"nginx-deployment-85f456d6dd-9cfrv\" (UID: \"4e913986-999f-44b8-bb55-12d64d75cc5f\") " pod="default/nginx-deployment-85f456d6dd-9cfrv" Dec 13 01:54:30.868489 env[1436]: time="2024-12-13T01:54:30.868442137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-9cfrv,Uid:4e913986-999f-44b8-bb55-12d64d75cc5f,Namespace:default,Attempt:0,}" Dec 13 01:54:31.034312 env[1436]: time="2024-12-13T01:54:31.034234861Z" level=error msg="Failed to destroy network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:31.038203 env[1436]: time="2024-12-13T01:54:31.037016114Z" level=error msg="encountered an error cleaning up failed sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:31.038203 env[1436]: time="2024-12-13T01:54:31.037081115Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-9cfrv,Uid:4e913986-999f-44b8-bb55-12d64d75cc5f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:31.038347 kubelet[1967]: E1213 01:54:31.037338 1967 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:31.038347 kubelet[1967]: E1213 01:54:31.037402 1967 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-9cfrv" Dec 13 01:54:31.038347 kubelet[1967]: E1213 01:54:31.037426 1967 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-9cfrv" Dec 13 01:54:31.036760 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5-shm.mount: Deactivated successfully. Dec 13 01:54:31.038531 kubelet[1967]: E1213 01:54:31.037490 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-9cfrv_default(4e913986-999f-44b8-bb55-12d64d75cc5f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-9cfrv_default(4e913986-999f-44b8-bb55-12d64d75cc5f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-9cfrv" podUID="4e913986-999f-44b8-bb55-12d64d75cc5f" Dec 13 01:54:31.084112 kubelet[1967]: E1213 01:54:31.084054 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:31.194043 kubelet[1967]: I1213 01:54:31.193281 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:54:31.194962 env[1436]: time="2024-12-13T01:54:31.194921324Z" level=info msg="StopPodSandbox for \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\"" Dec 13 01:54:31.269698 env[1436]: time="2024-12-13T01:54:31.269634548Z" level=error msg="StopPodSandbox for \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\" failed" error="failed to destroy network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:54:31.270024 kubelet[1967]: E1213 01:54:31.269991 1967 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:54:31.270141 kubelet[1967]: E1213 01:54:31.270041 1967 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5"} Dec 13 01:54:31.270141 kubelet[1967]: E1213 01:54:31.270081 1967 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4e913986-999f-44b8-bb55-12d64d75cc5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:54:31.270141 kubelet[1967]: E1213 01:54:31.270109 1967 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4e913986-999f-44b8-bb55-12d64d75cc5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-9cfrv" podUID="4e913986-999f-44b8-bb55-12d64d75cc5f" Dec 13 01:54:32.084371 kubelet[1967]: E1213 01:54:32.084283 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:33.084930 kubelet[1967]: E1213 01:54:33.084883 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:33.619477 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1078924803.mount: Deactivated successfully. Dec 13 01:54:33.668774 env[1436]: time="2024-12-13T01:54:33.668729885Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:33.676911 env[1436]: time="2024-12-13T01:54:33.676815632Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:33.681135 env[1436]: time="2024-12-13T01:54:33.681070109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:33.684948 env[1436]: time="2024-12-13T01:54:33.684920479Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:33.685339 env[1436]: time="2024-12-13T01:54:33.685289885Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 01:54:33.700629 env[1436]: time="2024-12-13T01:54:33.700363459Z" level=info msg="CreateContainer within sandbox \"baa89f913334d9f87c8e5c91cd933cbec3522bfb0ce75e6acce1077bebba78a2\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 01:54:33.744533 env[1436]: time="2024-12-13T01:54:33.744441058Z" level=info msg="CreateContainer within sandbox \"baa89f913334d9f87c8e5c91cd933cbec3522bfb0ce75e6acce1077bebba78a2\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e494f193d99495ca08d617315b8570bf8834ecdcc51f2518f27aeefc63b951ad\"" Dec 13 01:54:33.745647 env[1436]: time="2024-12-13T01:54:33.745604479Z" level=info msg="StartContainer for \"e494f193d99495ca08d617315b8570bf8834ecdcc51f2518f27aeefc63b951ad\"" Dec 13 01:54:33.766990 systemd[1]: Started cri-containerd-e494f193d99495ca08d617315b8570bf8834ecdcc51f2518f27aeefc63b951ad.scope. Dec 13 01:54:33.793916 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 01:54:33.794014 kernel: audit: type=1400 audit(1734054873.783:527): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fa320688ba8 items=0 ppid=2018 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:33.822000 kernel: audit: type=1300 audit(1734054873.783:527): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fa320688ba8 items=0 ppid=2018 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:33.822686 kernel: audit: type=1327 audit(1734054873.783:527): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534393466313933643939343935636130386436313733313562383537 Dec 13 01:54:33.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534393466313933643939343935636130386436313733313562383537 Dec 13 01:54:33.823620 env[1436]: time="2024-12-13T01:54:33.823582993Z" level=info msg="StartContainer for \"e494f193d99495ca08d617315b8570bf8834ecdcc51f2518f27aeefc63b951ad\" returns successfully" Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.856404 kernel: audit: type=1400 audit(1734054873.783:528): avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.856499 kernel: audit: type=1400 audit(1734054873.783:528): avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.870331 kernel: audit: type=1400 audit(1734054873.783:528): avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.894837 kernel: audit: type=1400 audit(1734054873.783:528): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.894905 kernel: audit: type=1400 audit(1734054873.783:528): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.920424 kernel: audit: type=1400 audit(1734054873.783:528): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.920485 kernel: audit: type=1400 audit(1734054873.783:528): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit: BPF prog-id=73 op=LOAD Dec 13 01:54:33.783000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000308518 items=0 ppid=2018 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:33.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534393466313933643939343935636130386436313733313562383537 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit: BPF prog-id=74 op=LOAD Dec 13 01:54:33.783000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000308568 items=0 ppid=2018 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:33.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534393466313933643939343935636130386436313733313562383537 Dec 13 01:54:33.783000 audit: BPF prog-id=74 op=UNLOAD Dec 13 01:54:33.783000 audit: BPF prog-id=73 op=UNLOAD Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:33.783000 audit: BPF prog-id=75 op=LOAD Dec 13 01:54:33.783000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003085f8 items=0 ppid=2018 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:33.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534393466313933643939343935636130386436313733313562383537 Dec 13 01:54:34.085158 kubelet[1967]: E1213 01:54:34.085104 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:34.186390 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 01:54:34.186541 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 01:54:34.237061 kubelet[1967]: I1213 01:54:34.237010 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-qx49s" podStartSLOduration=6.386256811 podStartE2EDuration="25.23699189s" podCreationTimestamp="2024-12-13 01:54:09 +0000 UTC" firstStartedPulling="2024-12-13 01:54:14.835471523 +0000 UTC m=+6.560990282" lastFinishedPulling="2024-12-13 01:54:33.686206602 +0000 UTC m=+25.411725361" observedRunningTime="2024-12-13 01:54:34.236654684 +0000 UTC m=+25.962173543" watchObservedRunningTime="2024-12-13 01:54:34.23699189 +0000 UTC m=+25.962510749" Dec 13 01:54:35.085447 kubelet[1967]: E1213 01:54:35.085384 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:35.477000 audit[2597]: AVC avc: denied { write } for pid=2597 comm="tee" name="fd" dev="proc" ino=23250 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:54:35.479000 audit[2595]: AVC avc: denied { write } for pid=2595 comm="tee" name="fd" dev="proc" ino=23682 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:54:35.480000 audit[2592]: AVC avc: denied { write } for pid=2592 comm="tee" name="fd" dev="proc" ino=23255 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:54:35.480000 audit[2592]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe471f9a1b a2=241 a3=1b6 items=1 ppid=2554 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.480000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 01:54:35.480000 audit: PATH item=0 name="/dev/fd/63" inode=23242 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:35.480000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:54:35.477000 audit[2597]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe797d8a19 a2=241 a3=1b6 items=1 ppid=2564 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.477000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 01:54:35.477000 audit: PATH item=0 name="/dev/fd/63" inode=23247 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:35.477000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:54:35.479000 audit[2595]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcf318a0a a2=241 a3=1b6 items=1 ppid=2556 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.479000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 01:54:35.479000 audit: PATH item=0 name="/dev/fd/63" inode=23243 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:35.479000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:54:35.494000 audit[2607]: AVC avc: denied { write } for pid=2607 comm="tee" name="fd" dev="proc" ino=23262 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:54:35.495000 audit[2605]: AVC avc: denied { write } for pid=2605 comm="tee" name="fd" dev="proc" ino=23698 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:54:35.495000 audit[2605]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4f7baa19 a2=241 a3=1b6 items=1 ppid=2558 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.495000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 01:54:35.495000 audit: PATH item=0 name="/dev/fd/63" inode=23685 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:35.495000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:54:35.494000 audit[2607]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1689da19 a2=241 a3=1b6 items=1 ppid=2566 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.494000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 01:54:35.494000 audit: PATH item=0 name="/dev/fd/63" inode=23258 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:35.494000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:54:35.497000 audit[2609]: AVC avc: denied { write } for pid=2609 comm="tee" name="fd" dev="proc" ino=23702 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:54:35.497000 audit[2609]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdbb4caa1a a2=241 a3=1b6 items=1 ppid=2562 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.497000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 01:54:35.497000 audit: PATH item=0 name="/dev/fd/63" inode=23688 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:35.497000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:54:35.500000 audit[2611]: AVC avc: denied { write } for pid=2611 comm="tee" name="fd" dev="proc" ino=23706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:54:35.500000 audit[2611]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9e243a09 a2=241 a3=1b6 items=1 ppid=2560 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.500000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 01:54:35.500000 audit: PATH item=0 name="/dev/fd/63" inode=23691 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:35.500000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit: BPF prog-id=76 op=LOAD Dec 13 01:54:35.680000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd908d69f0 a2=98 a3=3 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.680000 audit: BPF prog-id=76 op=UNLOAD Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit: BPF prog-id=77 op=LOAD Dec 13 01:54:35.680000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd908d67d0 a2=74 a3=540051 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.680000 audit: BPF prog-id=77 op=UNLOAD Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.680000 audit: BPF prog-id=78 op=LOAD Dec 13 01:54:35.680000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd908d6800 a2=94 a3=2 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.681000 audit: BPF prog-id=78 op=UNLOAD Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit: BPF prog-id=79 op=LOAD Dec 13 01:54:35.794000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd908d66c0 a2=40 a3=1 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.794000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.794000 audit: BPF prog-id=79 op=UNLOAD Dec 13 01:54:35.794000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.794000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd908d6790 a2=50 a3=7ffd908d6870 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.794000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd908d66d0 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd908d6700 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd908d6610 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd908d6720 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd908d6700 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd908d66f0 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd908d6720 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd908d6700 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd908d6720 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd908d66f0 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd908d6760 a2=28 a3=0 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd908d6510 a2=50 a3=1 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit: BPF prog-id=80 op=LOAD Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd908d6510 a2=94 a3=5 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit: BPF prog-id=80 op=UNLOAD Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd908d65c0 a2=50 a3=1 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd908d66e0 a2=4 a3=38 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.808000 audit[2660]: AVC avc: denied { confidentiality } for pid=2660 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:54:35.808000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd908d6730 a2=94 a3=6 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { confidentiality } for pid=2660 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:54:35.809000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd908d5ee0 a2=94 a3=83 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.809000 audit[2660]: AVC avc: denied { confidentiality } for pid=2660 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:54:35.809000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd908d5ee0 a2=94 a3=83 items=0 ppid=2565 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:54:35.817000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.817000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.817000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.817000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.817000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.817000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.817000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.817000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.817000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.817000 audit: BPF prog-id=81 op=LOAD Dec 13 01:54:35.817000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff328c8d0 a2=98 a3=1999999999999999 items=0 ppid=2565 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.817000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:54:35.818000 audit: BPF prog-id=81 op=UNLOAD Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit: BPF prog-id=82 op=LOAD Dec 13 01:54:35.818000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff328c7b0 a2=74 a3=ffff items=0 ppid=2565 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.818000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:54:35.818000 audit: BPF prog-id=82 op=UNLOAD Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.818000 audit: BPF prog-id=83 op=LOAD Dec 13 01:54:35.818000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff328c7f0 a2=40 a3=7ffff328c9d0 items=0 ppid=2565 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.818000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:54:35.818000 audit: BPF prog-id=83 op=UNLOAD Dec 13 01:54:35.900000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.900000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.900000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.900000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.900000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.900000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.900000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.900000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.900000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.900000 audit: BPF prog-id=84 op=LOAD Dec 13 01:54:35.900000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcdd87730 a2=98 a3=ffffffff items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.900000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.901000 audit: BPF prog-id=84 op=UNLOAD Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit: BPF prog-id=85 op=LOAD Dec 13 01:54:35.901000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcdd87540 a2=74 a3=540051 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.901000 audit: BPF prog-id=85 op=UNLOAD Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.901000 audit: BPF prog-id=86 op=LOAD Dec 13 01:54:35.901000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcdd87570 a2=94 a3=2 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit: BPF prog-id=86 op=UNLOAD Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffcdd87440 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcdd87470 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcdd87380 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffcdd87490 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffcdd87470 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffcdd87460 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffcdd87490 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcdd87470 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcdd87490 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcdd87460 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffcdd874d0 a2=28 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.902000 audit: BPF prog-id=87 op=LOAD Dec 13 01:54:35.902000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffcdd87340 a2=40 a3=0 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.902000 audit: BPF prog-id=87 op=UNLOAD Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffcdd87330 a2=50 a3=2800 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffcdd87330 a2=50 a3=2800 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit: BPF prog-id=88 op=LOAD Dec 13 01:54:35.903000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffcdd86b50 a2=94 a3=2 items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.903000 audit: BPF prog-id=88 op=UNLOAD Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.903000 audit: BPF prog-id=89 op=LOAD Dec 13 01:54:35.903000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffcdd86c50 a2=94 a3=2d items=0 ppid=2565 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit: BPF prog-id=90 op=LOAD Dec 13 01:54:35.907000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdee4049e0 a2=98 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.907000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:35.907000 audit: BPF prog-id=90 op=UNLOAD Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit: BPF prog-id=91 op=LOAD Dec 13 01:54:35.907000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdee4047c0 a2=74 a3=540051 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.907000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:35.907000 audit: BPF prog-id=91 op=UNLOAD Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:35.907000 audit: BPF prog-id=92 op=LOAD Dec 13 01:54:35.907000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdee4047f0 a2=94 a3=2 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:35.907000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:35.907000 audit: BPF prog-id=92 op=UNLOAD Dec 13 01:54:35.918758 systemd-networkd[1587]: vxlan.calico: Link UP Dec 13 01:54:35.918763 systemd-networkd[1587]: vxlan.calico: Gained carrier Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit: BPF prog-id=93 op=LOAD Dec 13 01:54:36.040000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdee4046b0 a2=40 a3=1 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.040000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.040000 audit: BPF prog-id=93 op=UNLOAD Dec 13 01:54:36.040000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.040000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdee404780 a2=50 a3=7ffdee404860 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.040000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.049000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.049000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdee4046c0 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.049000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.049000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.049000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdee4046f0 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.049000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.049000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.049000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdee404600 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.049000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.049000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.049000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdee404710 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.049000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdee4046f0 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdee4046e0 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdee404710 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdee4046f0 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdee404710 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdee4046e0 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdee404750 a2=28 a3=0 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdee404500 a2=50 a3=1 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit: BPF prog-id=94 op=LOAD Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdee404500 a2=94 a3=5 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit: BPF prog-id=94 op=UNLOAD Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdee4045b0 a2=50 a3=1 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdee4046d0 a2=4 a3=38 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { confidentiality } for pid=2695 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdee404720 a2=94 a3=6 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.050000 audit[2695]: AVC avc: denied { confidentiality } for pid=2695 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:54:36.050000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdee403ed0 a2=94 a3=83 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.051000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.051000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.051000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.051000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.051000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.051000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.051000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.051000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.051000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdee403ed0 a2=94 a3=83 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.056000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.056000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdee405910 a2=10 a3=f1f00800 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.056000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.056000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdee4057b0 a2=10 a3=3 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.056000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.056000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdee405750 a2=10 a3=3 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.057000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:36.057000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdee405750 a2=10 a3=7 items=0 ppid=2565 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.057000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:54:36.064000 audit: BPF prog-id=89 op=UNLOAD Dec 13 01:54:36.085801 kubelet[1967]: E1213 01:54:36.085766 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:36.179000 audit[2721]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:54:36.179000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffde38621c0 a2=0 a3=7ffde38621ac items=0 ppid=2565 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.179000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:54:36.231000 audit[2722]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:54:36.231000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd34e1b5e0 a2=0 a3=7ffd34e1b5cc items=0 ppid=2565 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.231000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:54:36.233000 audit[2723]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:54:36.233000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe91074c40 a2=0 a3=7ffe91074c2c items=0 ppid=2565 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.233000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:54:36.283000 audit[2720]: NETFILTER_CFG table=raw:71 family=2 entries=21 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:54:36.283000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe723dee60 a2=0 a3=7ffe723dee4c items=0 ppid=2565 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:36.283000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:54:36.405945 kubelet[1967]: I1213 01:54:36.405758 1967 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:54:36.427061 systemd[1]: run-containerd-runc-k8s.io-e494f193d99495ca08d617315b8570bf8834ecdcc51f2518f27aeefc63b951ad-runc.IlDS4Q.mount: Deactivated successfully. Dec 13 01:54:36.490765 systemd[1]: run-containerd-runc-k8s.io-e494f193d99495ca08d617315b8570bf8834ecdcc51f2518f27aeefc63b951ad-runc.BrdVsc.mount: Deactivated successfully. Dec 13 01:54:37.086163 kubelet[1967]: E1213 01:54:37.086103 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:37.145717 systemd-networkd[1587]: vxlan.calico: Gained IPv6LL Dec 13 01:54:38.086823 kubelet[1967]: E1213 01:54:38.086760 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:39.087085 kubelet[1967]: E1213 01:54:39.087038 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:39.136242 env[1436]: time="2024-12-13T01:54:39.135680678Z" level=info msg="StopPodSandbox for \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\"" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.182 [INFO][2798] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.182 [INFO][2798] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" iface="eth0" netns="/var/run/netns/cni-e961e43f-76d4-ef64-ecd7-2a5f84a9ebcb" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.182 [INFO][2798] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" iface="eth0" netns="/var/run/netns/cni-e961e43f-76d4-ef64-ecd7-2a5f84a9ebcb" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.183 [INFO][2798] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" iface="eth0" netns="/var/run/netns/cni-e961e43f-76d4-ef64-ecd7-2a5f84a9ebcb" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.183 [INFO][2798] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.183 [INFO][2798] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.208 [INFO][2805] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" HandleID="k8s-pod-network.635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.208 [INFO][2805] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.209 [INFO][2805] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.216 [WARNING][2805] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" HandleID="k8s-pod-network.635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.216 [INFO][2805] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" HandleID="k8s-pod-network.635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.217 [INFO][2805] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:54:39.221258 env[1436]: 2024-12-13 01:54:39.220 [INFO][2798] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:54:39.225450 env[1436]: time="2024-12-13T01:54:39.223791660Z" level=info msg="TearDown network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\" successfully" Dec 13 01:54:39.225450 env[1436]: time="2024-12-13T01:54:39.223839961Z" level=info msg="StopPodSandbox for \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\" returns successfully" Dec 13 01:54:39.225450 env[1436]: time="2024-12-13T01:54:39.225030979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tw8wx,Uid:4f8f1613-73c8-4ce1-870f-3681b1103b18,Namespace:calico-system,Attempt:1,}" Dec 13 01:54:39.223820 systemd[1]: run-netns-cni\x2de961e43f\x2d76d4\x2def64\x2decd7\x2d2a5f84a9ebcb.mount: Deactivated successfully. Dec 13 01:54:39.392787 systemd-networkd[1587]: cali5c4799d63ec: Link UP Dec 13 01:54:39.399338 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:54:39.399409 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5c4799d63ec: link becomes ready Dec 13 01:54:39.404930 systemd-networkd[1587]: cali5c4799d63ec: Gained carrier Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.315 [INFO][2812] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.19-k8s-csi--node--driver--tw8wx-eth0 csi-node-driver- calico-system 4f8f1613-73c8-4ce1-870f-3681b1103b18 1225 0 2024-12-13 01:54:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.8.19 csi-node-driver-tw8wx eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali5c4799d63ec [] []}} ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Namespace="calico-system" Pod="csi-node-driver-tw8wx" WorkloadEndpoint="10.200.8.19-k8s-csi--node--driver--tw8wx-" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.315 [INFO][2812] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Namespace="calico-system" Pod="csi-node-driver-tw8wx" WorkloadEndpoint="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.344 [INFO][2823] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" HandleID="k8s-pod-network.b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.354 [INFO][2823] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" HandleID="k8s-pod-network.b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003bd330), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.19", "pod":"csi-node-driver-tw8wx", "timestamp":"2024-12-13 01:54:39.344124048 +0000 UTC"}, Hostname:"10.200.8.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.354 [INFO][2823] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.354 [INFO][2823] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.354 [INFO][2823] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.19' Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.356 [INFO][2823] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" host="10.200.8.19" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.359 [INFO][2823] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.19" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.362 [INFO][2823] ipam/ipam.go 489: Trying affinity for 192.168.41.128/26 host="10.200.8.19" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.364 [INFO][2823] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.128/26 host="10.200.8.19" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.366 [INFO][2823] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="10.200.8.19" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.366 [INFO][2823] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" host="10.200.8.19" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.367 [INFO][2823] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22 Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.371 [INFO][2823] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" host="10.200.8.19" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.386 [INFO][2823] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.129/26] block=192.168.41.128/26 handle="k8s-pod-network.b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" host="10.200.8.19" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.386 [INFO][2823] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.129/26] handle="k8s-pod-network.b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" host="10.200.8.19" Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.386 [INFO][2823] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:54:39.418016 env[1436]: 2024-12-13 01:54:39.386 [INFO][2823] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.129/26] IPv6=[] ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" HandleID="k8s-pod-network.b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.419019 env[1436]: 2024-12-13 01:54:39.389 [INFO][2812] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Namespace="calico-system" Pod="csi-node-driver-tw8wx" WorkloadEndpoint="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-csi--node--driver--tw8wx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f8f1613-73c8-4ce1-870f-3681b1103b18", ResourceVersion:"1225", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"", Pod:"csi-node-driver-tw8wx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5c4799d63ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:54:39.419019 env[1436]: 2024-12-13 01:54:39.389 [INFO][2812] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.129/32] ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Namespace="calico-system" Pod="csi-node-driver-tw8wx" WorkloadEndpoint="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.419019 env[1436]: 2024-12-13 01:54:39.389 [INFO][2812] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5c4799d63ec ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Namespace="calico-system" Pod="csi-node-driver-tw8wx" WorkloadEndpoint="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.419019 env[1436]: 2024-12-13 01:54:39.406 [INFO][2812] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Namespace="calico-system" Pod="csi-node-driver-tw8wx" WorkloadEndpoint="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.419019 env[1436]: 2024-12-13 01:54:39.406 [INFO][2812] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Namespace="calico-system" Pod="csi-node-driver-tw8wx" WorkloadEndpoint="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-csi--node--driver--tw8wx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f8f1613-73c8-4ce1-870f-3681b1103b18", ResourceVersion:"1225", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22", Pod:"csi-node-driver-tw8wx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5c4799d63ec", MAC:"76:18:98:ab:1f:c5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:54:39.419019 env[1436]: 2024-12-13 01:54:39.416 [INFO][2812] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22" Namespace="calico-system" Pod="csi-node-driver-tw8wx" WorkloadEndpoint="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:54:39.428000 audit[2841]: NETFILTER_CFG table=filter:72 family=2 entries=34 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:54:39.434897 kernel: kauditd_printk_skb: 554 callbacks suppressed Dec 13 01:54:39.434965 kernel: audit: type=1325 audit(1734054879.428:635): table=filter:72 family=2 entries=34 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:54:39.428000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffdbe850ac0 a2=0 a3=7ffdbe850aac items=0 ppid=2565 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:39.466802 kernel: audit: type=1300 audit(1734054879.428:635): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffdbe850ac0 a2=0 a3=7ffdbe850aac items=0 ppid=2565 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:39.428000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:54:39.474640 env[1436]: time="2024-12-13T01:54:39.474588894Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:54:39.474764 env[1436]: time="2024-12-13T01:54:39.474743897Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:54:39.474832 env[1436]: time="2024-12-13T01:54:39.474817398Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:54:39.475116 env[1436]: time="2024-12-13T01:54:39.475083402Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22 pid=2852 runtime=io.containerd.runc.v2 Dec 13 01:54:39.484914 kernel: audit: type=1327 audit(1734054879.428:635): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:54:39.501549 systemd[1]: Started cri-containerd-b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22.scope. Dec 13 01:54:39.526788 kernel: audit: type=1400 audit(1734054879.510:636): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.540359 kernel: audit: type=1400 audit(1734054879.510:637): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.559384 kernel: audit: type=1400 audit(1734054879.510:638): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.574321 kernel: audit: type=1400 audit(1734054879.510:639): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.582559 env[1436]: time="2024-12-13T01:54:39.582521387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tw8wx,Uid:4f8f1613-73c8-4ce1-870f-3681b1103b18,Namespace:calico-system,Attempt:1,} returns sandbox id \"b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22\"" Dec 13 01:54:39.584573 env[1436]: time="2024-12-13T01:54:39.584552219Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 01:54:39.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.603886 kernel: audit: type=1400 audit(1734054879.510:640): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.603961 kernel: audit: type=1400 audit(1734054879.510:641): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit: BPF prog-id=95 op=LOAD Dec 13 01:54:39.617404 kernel: audit: type=1400 audit(1734054879.510:642): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2852 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:39.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623862313234633665623564633432356662663463303531316564 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2852 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:39.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623862313234633665623564633432356662663463303531316564 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.525000 audit: BPF prog-id=96 op=LOAD Dec 13 01:54:39.525000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185b00 items=0 ppid=2852 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:39.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623862313234633665623564633432356662663463303531316564 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit: BPF prog-id=97 op=LOAD Dec 13 01:54:39.539000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185b48 items=0 ppid=2852 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:39.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623862313234633665623564633432356662663463303531316564 Dec 13 01:54:39.539000 audit: BPF prog-id=97 op=UNLOAD Dec 13 01:54:39.539000 audit: BPF prog-id=96 op=UNLOAD Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:39.539000 audit: BPF prog-id=98 op=LOAD Dec 13 01:54:39.539000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185f58 items=0 ppid=2852 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:39.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623862313234633665623564633432356662663463303531316564 Dec 13 01:54:40.088015 kubelet[1967]: E1213 01:54:40.087961 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:40.224214 systemd[1]: run-containerd-runc-k8s.io-b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22-runc.7Wwjf4.mount: Deactivated successfully. Dec 13 01:54:40.665597 systemd-networkd[1587]: cali5c4799d63ec: Gained IPv6LL Dec 13 01:54:40.876850 env[1436]: time="2024-12-13T01:54:40.876795074Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:40.884873 env[1436]: time="2024-12-13T01:54:40.884786596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:40.888536 env[1436]: time="2024-12-13T01:54:40.888496553Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:40.893034 env[1436]: time="2024-12-13T01:54:40.892991422Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:40.893626 env[1436]: time="2024-12-13T01:54:40.893588331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 01:54:40.895995 env[1436]: time="2024-12-13T01:54:40.895966368Z" level=info msg="CreateContainer within sandbox \"b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 01:54:40.934235 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount246250286.mount: Deactivated successfully. Dec 13 01:54:40.948334 env[1436]: time="2024-12-13T01:54:40.948285469Z" level=info msg="CreateContainer within sandbox \"b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8013f687af0efd5ed2e3e9d4d3066b47cb560dcf26ff0799fe812508b6d59bb1\"" Dec 13 01:54:40.948820 env[1436]: time="2024-12-13T01:54:40.948793877Z" level=info msg="StartContainer for \"8013f687af0efd5ed2e3e9d4d3066b47cb560dcf26ff0799fe812508b6d59bb1\"" Dec 13 01:54:40.972105 systemd[1]: Started cri-containerd-8013f687af0efd5ed2e3e9d4d3066b47cb560dcf26ff0799fe812508b6d59bb1.scope. Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fd9fa22d8e8 items=0 ppid=2852 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:40.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313366363837616630656664356564326533653964346433303636 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit: BPF prog-id=99 op=LOAD Dec 13 01:54:40.987000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00039ee78 items=0 ppid=2852 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:40.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313366363837616630656664356564326533653964346433303636 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit: BPF prog-id=100 op=LOAD Dec 13 01:54:40.987000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00039eec8 items=0 ppid=2852 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:40.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313366363837616630656664356564326533653964346433303636 Dec 13 01:54:40.987000 audit: BPF prog-id=100 op=UNLOAD Dec 13 01:54:40.987000 audit: BPF prog-id=99 op=UNLOAD Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:40.987000 audit: BPF prog-id=101 op=LOAD Dec 13 01:54:40.987000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00039ef58 items=0 ppid=2852 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:40.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313366363837616630656664356564326533653964346433303636 Dec 13 01:54:41.006278 env[1436]: time="2024-12-13T01:54:41.006240056Z" level=info msg="StartContainer for \"8013f687af0efd5ed2e3e9d4d3066b47cb560dcf26ff0799fe812508b6d59bb1\" returns successfully" Dec 13 01:54:41.007405 env[1436]: time="2024-12-13T01:54:41.007367572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 01:54:41.088159 kubelet[1967]: E1213 01:54:41.088102 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:42.088606 kubelet[1967]: E1213 01:54:42.088544 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:42.134952 env[1436]: time="2024-12-13T01:54:42.134826305Z" level=info msg="StopPodSandbox for \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\"" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.184 [INFO][2942] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.184 [INFO][2942] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" iface="eth0" netns="/var/run/netns/cni-f357074e-be3a-d9e5-b87f-3c7096e3b530" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.184 [INFO][2942] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" iface="eth0" netns="/var/run/netns/cni-f357074e-be3a-d9e5-b87f-3c7096e3b530" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.184 [INFO][2942] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" iface="eth0" netns="/var/run/netns/cni-f357074e-be3a-d9e5-b87f-3c7096e3b530" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.184 [INFO][2942] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.184 [INFO][2942] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.217 [INFO][2948] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" HandleID="k8s-pod-network.b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.217 [INFO][2948] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.217 [INFO][2948] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.243 [WARNING][2948] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" HandleID="k8s-pod-network.b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.243 [INFO][2948] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" HandleID="k8s-pod-network.b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.245 [INFO][2948] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:54:42.247897 env[1436]: 2024-12-13 01:54:42.246 [INFO][2942] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:54:42.251136 systemd[1]: run-netns-cni\x2df357074e\x2dbe3a\x2dd9e5\x2db87f\x2d3c7096e3b530.mount: Deactivated successfully. Dec 13 01:54:42.253031 env[1436]: time="2024-12-13T01:54:42.252989733Z" level=info msg="TearDown network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\" successfully" Dec 13 01:54:42.253128 env[1436]: time="2024-12-13T01:54:42.253110935Z" level=info msg="StopPodSandbox for \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\" returns successfully" Dec 13 01:54:42.253824 env[1436]: time="2024-12-13T01:54:42.253793345Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-9cfrv,Uid:4e913986-999f-44b8-bb55-12d64d75cc5f,Namespace:default,Attempt:1,}" Dec 13 01:54:42.453284 systemd-networkd[1587]: califebd15ee342: Link UP Dec 13 01:54:42.468687 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:54:42.468789 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califebd15ee342: link becomes ready Dec 13 01:54:42.471683 systemd-networkd[1587]: califebd15ee342: Gained carrier Dec 13 01:54:42.482540 env[1436]: time="2024-12-13T01:54:42.482500290Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.367 [INFO][2954] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0 nginx-deployment-85f456d6dd- default 4e913986-999f-44b8-bb55-12d64d75cc5f 1242 0 2024-12-13 01:54:30 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.19 nginx-deployment-85f456d6dd-9cfrv eth0 default [] [] [kns.default ksa.default.default] califebd15ee342 [] []}} ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Namespace="default" Pod="nginx-deployment-85f456d6dd-9cfrv" WorkloadEndpoint="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.368 [INFO][2954] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Namespace="default" Pod="nginx-deployment-85f456d6dd-9cfrv" WorkloadEndpoint="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.409 [INFO][2966] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" HandleID="k8s-pod-network.878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.419 [INFO][2966] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" HandleID="k8s-pod-network.878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00012aba0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.19", "pod":"nginx-deployment-85f456d6dd-9cfrv", "timestamp":"2024-12-13 01:54:42.409488022 +0000 UTC"}, Hostname:"10.200.8.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.419 [INFO][2966] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.420 [INFO][2966] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.420 [INFO][2966] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.19' Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.421 [INFO][2966] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" host="10.200.8.19" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.425 [INFO][2966] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.19" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.429 [INFO][2966] ipam/ipam.go 489: Trying affinity for 192.168.41.128/26 host="10.200.8.19" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.430 [INFO][2966] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.128/26 host="10.200.8.19" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.432 [INFO][2966] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="10.200.8.19" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.432 [INFO][2966] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" host="10.200.8.19" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.434 [INFO][2966] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.438 [INFO][2966] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" host="10.200.8.19" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.448 [INFO][2966] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.130/26] block=192.168.41.128/26 handle="k8s-pod-network.878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" host="10.200.8.19" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.448 [INFO][2966] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.130/26] handle="k8s-pod-network.878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" host="10.200.8.19" Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.448 [INFO][2966] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:54:42.484840 env[1436]: 2024-12-13 01:54:42.448 [INFO][2966] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.130/26] IPv6=[] ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" HandleID="k8s-pod-network.878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.485948 env[1436]: 2024-12-13 01:54:42.450 [INFO][2954] cni-plugin/k8s.go 386: Populated endpoint ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Namespace="default" Pod="nginx-deployment-85f456d6dd-9cfrv" WorkloadEndpoint="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"4e913986-999f-44b8-bb55-12d64d75cc5f", ResourceVersion:"1242", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-9cfrv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califebd15ee342", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:54:42.485948 env[1436]: 2024-12-13 01:54:42.450 [INFO][2954] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.130/32] ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Namespace="default" Pod="nginx-deployment-85f456d6dd-9cfrv" WorkloadEndpoint="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.485948 env[1436]: 2024-12-13 01:54:42.450 [INFO][2954] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califebd15ee342 ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Namespace="default" Pod="nginx-deployment-85f456d6dd-9cfrv" WorkloadEndpoint="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.485948 env[1436]: 2024-12-13 01:54:42.471 [INFO][2954] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Namespace="default" Pod="nginx-deployment-85f456d6dd-9cfrv" WorkloadEndpoint="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.485948 env[1436]: 2024-12-13 01:54:42.472 [INFO][2954] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Namespace="default" Pod="nginx-deployment-85f456d6dd-9cfrv" WorkloadEndpoint="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"4e913986-999f-44b8-bb55-12d64d75cc5f", ResourceVersion:"1242", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b", Pod:"nginx-deployment-85f456d6dd-9cfrv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califebd15ee342", MAC:"0a:3b:5f:2b:bc:1c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:54:42.485948 env[1436]: 2024-12-13 01:54:42.483 [INFO][2954] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b" Namespace="default" Pod="nginx-deployment-85f456d6dd-9cfrv" WorkloadEndpoint="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:54:42.495651 env[1436]: time="2024-12-13T01:54:42.495619082Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:42.497000 audit[2984]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_chain pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:54:42.497000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffd82319f30 a2=0 a3=7ffd82319f1c items=0 ppid=2565 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.497000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:54:42.499908 env[1436]: time="2024-12-13T01:54:42.499875044Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:42.511588 env[1436]: time="2024-12-13T01:54:42.511543115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:42.512165 env[1436]: time="2024-12-13T01:54:42.512132924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 01:54:42.512874 env[1436]: time="2024-12-13T01:54:42.512692032Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:54:42.512874 env[1436]: time="2024-12-13T01:54:42.512733533Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:54:42.512874 env[1436]: time="2024-12-13T01:54:42.512748633Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:54:42.513483 env[1436]: time="2024-12-13T01:54:42.513401142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b pid=2997 runtime=io.containerd.runc.v2 Dec 13 01:54:42.515220 env[1436]: time="2024-12-13T01:54:42.515186968Z" level=info msg="CreateContainer within sandbox \"b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 01:54:42.537238 systemd[1]: Started cri-containerd-878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b.scope. Dec 13 01:54:42.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit: BPF prog-id=102 op=LOAD Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2997 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837386163366339303033626436313164393965303637623866663939 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2997 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837386163366339303033626436313164393965303637623866663939 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit: BPF prog-id=103 op=LOAD Dec 13 01:54:42.553000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00030a860 items=0 ppid=2997 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837386163366339303033626436313164393965303637623866663939 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.553000 audit: BPF prog-id=104 op=LOAD Dec 13 01:54:42.553000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00030a8a8 items=0 ppid=2997 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837386163366339303033626436313164393965303637623866663939 Dec 13 01:54:42.553000 audit: BPF prog-id=104 op=UNLOAD Dec 13 01:54:42.553000 audit: BPF prog-id=103 op=UNLOAD Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.554000 audit: BPF prog-id=105 op=LOAD Dec 13 01:54:42.554000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00030acb8 items=0 ppid=2997 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837386163366339303033626436313164393965303637623866663939 Dec 13 01:54:42.570420 env[1436]: time="2024-12-13T01:54:42.570383376Z" level=info msg="CreateContainer within sandbox \"b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6e14cad275420abf42110a717ce7e7c76ed031a9e7bc4f715214a8ebd0d1132a\"" Dec 13 01:54:42.571400 env[1436]: time="2024-12-13T01:54:42.571375490Z" level=info msg="StartContainer for \"6e14cad275420abf42110a717ce7e7c76ed031a9e7bc4f715214a8ebd0d1132a\"" Dec 13 01:54:42.591481 env[1436]: time="2024-12-13T01:54:42.591442584Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-9cfrv,Uid:4e913986-999f-44b8-bb55-12d64d75cc5f,Namespace:default,Attempt:1,} returns sandbox id \"878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b\"" Dec 13 01:54:42.594712 env[1436]: time="2024-12-13T01:54:42.594681531Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 01:54:42.598683 systemd[1]: Started cri-containerd-6e14cad275420abf42110a717ce7e7c76ed031a9e7bc4f715214a8ebd0d1132a.scope. Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f73d5bcc5b8 items=0 ppid=2852 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665313463616432373534323061626634323131306137313763653765 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.611000 audit: BPF prog-id=106 op=LOAD Dec 13 01:54:42.611000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00036bcd8 items=0 ppid=2852 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665313463616432373534323061626634323131306137313763653765 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit: BPF prog-id=107 op=LOAD Dec 13 01:54:42.612000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00036bd28 items=0 ppid=2852 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665313463616432373534323061626634323131306137313763653765 Dec 13 01:54:42.612000 audit: BPF prog-id=107 op=UNLOAD Dec 13 01:54:42.612000 audit: BPF prog-id=106 op=UNLOAD Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:42.612000 audit: BPF prog-id=108 op=LOAD Dec 13 01:54:42.612000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00036bdb8 items=0 ppid=2852 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:42.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665313463616432373534323061626634323131306137313763653765 Dec 13 01:54:42.634426 env[1436]: time="2024-12-13T01:54:42.634398112Z" level=info msg="StartContainer for \"6e14cad275420abf42110a717ce7e7c76ed031a9e7bc4f715214a8ebd0d1132a\" returns successfully" Dec 13 01:54:43.088829 kubelet[1967]: E1213 01:54:43.088770 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:43.186754 kubelet[1967]: I1213 01:54:43.186718 1967 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 01:54:43.186754 kubelet[1967]: I1213 01:54:43.186753 1967 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 01:54:43.248501 kubelet[1967]: I1213 01:54:43.248441 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-tw8wx" podStartSLOduration=31.319225883 podStartE2EDuration="34.248422812s" podCreationTimestamp="2024-12-13 01:54:09 +0000 UTC" firstStartedPulling="2024-12-13 01:54:39.584293415 +0000 UTC m=+31.309812174" lastFinishedPulling="2024-12-13 01:54:42.513490344 +0000 UTC m=+34.239009103" observedRunningTime="2024-12-13 01:54:43.248339611 +0000 UTC m=+34.973858370" watchObservedRunningTime="2024-12-13 01:54:43.248422812 +0000 UTC m=+34.973941671" Dec 13 01:54:43.254249 systemd[1]: run-containerd-runc-k8s.io-878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b-runc.URJ24S.mount: Deactivated successfully. Dec 13 01:54:44.089779 kubelet[1967]: E1213 01:54:44.089686 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:44.313771 systemd-networkd[1587]: califebd15ee342: Gained IPv6LL Dec 13 01:54:45.090664 kubelet[1967]: E1213 01:54:45.090601 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:45.512509 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2950361681.mount: Deactivated successfully. Dec 13 01:54:46.090872 kubelet[1967]: E1213 01:54:46.090825 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:47.025269 env[1436]: time="2024-12-13T01:54:47.025152291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:47.035820 env[1436]: time="2024-12-13T01:54:47.035721529Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:47.041452 env[1436]: time="2024-12-13T01:54:47.041418404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:47.045934 env[1436]: time="2024-12-13T01:54:47.045799061Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:47.046902 env[1436]: time="2024-12-13T01:54:47.046869475Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 01:54:47.049526 env[1436]: time="2024-12-13T01:54:47.049496609Z" level=info msg="CreateContainer within sandbox \"878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 01:54:47.079540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1329266872.mount: Deactivated successfully. Dec 13 01:54:47.091383 kubelet[1967]: E1213 01:54:47.091352 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:47.097210 env[1436]: time="2024-12-13T01:54:47.097172633Z" level=info msg="CreateContainer within sandbox \"878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"23f486893c708dee8578bc8644405ddebf7d373805140baa11e4991b1b4398ef\"" Dec 13 01:54:47.097934 env[1436]: time="2024-12-13T01:54:47.097903242Z" level=info msg="StartContainer for \"23f486893c708dee8578bc8644405ddebf7d373805140baa11e4991b1b4398ef\"" Dec 13 01:54:47.117635 systemd[1]: Started cri-containerd-23f486893c708dee8578bc8644405ddebf7d373805140baa11e4991b1b4398ef.scope. Dec 13 01:54:47.148194 kernel: kauditd_printk_skb: 196 callbacks suppressed Dec 13 01:54:47.148297 kernel: audit: type=1400 audit(1734054887.129:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.183223 kernel: audit: type=1400 audit(1734054887.129:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.183957 kernel: audit: type=1400 audit(1734054887.129:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.186319 env[1436]: time="2024-12-13T01:54:47.184906079Z" level=info msg="StartContainer for \"23f486893c708dee8578bc8644405ddebf7d373805140baa11e4991b1b4398ef\" returns successfully" Dec 13 01:54:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.212201 kernel: audit: type=1400 audit(1734054887.129:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.212281 kernel: audit: type=1400 audit(1734054887.129:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.237390 kernel: audit: type=1400 audit(1734054887.129:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.237450 kernel: audit: type=1400 audit(1734054887.129:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.237472 kernel: audit: type=1400 audit(1734054887.129:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.277320 kernel: audit: type=1400 audit(1734054887.129:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.277406 kernel: audit: type=1400 audit(1734054887.147:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit: BPF prog-id=109 op=LOAD Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2997 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:47.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663438363839336337303864656538353738626338363434343035 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2997 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:47.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663438363839336337303864656538353738626338363434343035 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit: BPF prog-id=110 op=LOAD Dec 13 01:54:47.147000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00031e980 items=0 ppid=2997 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:47.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663438363839336337303864656538353738626338363434343035 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit: BPF prog-id=111 op=LOAD Dec 13 01:54:47.147000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00031e9c8 items=0 ppid=2997 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:47.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663438363839336337303864656538353738626338363434343035 Dec 13 01:54:47.147000 audit: BPF prog-id=111 op=UNLOAD Dec 13 01:54:47.147000 audit: BPF prog-id=110 op=UNLOAD Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:47.147000 audit: BPF prog-id=112 op=LOAD Dec 13 01:54:47.147000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00031edd8 items=0 ppid=2997 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:47.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663438363839336337303864656538353738626338363434343035 Dec 13 01:54:48.091747 kubelet[1967]: E1213 01:54:48.091691 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:49.064918 kubelet[1967]: E1213 01:54:49.064854 1967 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:49.092488 kubelet[1967]: E1213 01:54:49.092386 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:50.093404 kubelet[1967]: E1213 01:54:50.093350 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:51.093650 kubelet[1967]: E1213 01:54:51.093586 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:52.093890 kubelet[1967]: E1213 01:54:52.093832 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:53.094604 kubelet[1967]: E1213 01:54:53.094546 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:54.095470 kubelet[1967]: E1213 01:54:54.095413 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:54.931000 audit[3144]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:54.936834 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 01:54:54.936935 kernel: audit: type=1325 audit(1734054894.931:703): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:54.931000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffee9d08b90 a2=0 a3=7ffee9d08b7c items=0 ppid=2172 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:54.947368 kernel: audit: type=1300 audit(1734054894.931:703): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffee9d08b90 a2=0 a3=7ffee9d08b7c items=0 ppid=2172 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:54.931000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:54.977025 kernel: audit: type=1327 audit(1734054894.931:703): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:54.977108 kernel: audit: type=1325 audit(1734054894.965:704): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:54.965000 audit[3144]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:54.965000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffee9d08b90 a2=0 a3=0 items=0 ppid=2172 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:54.997525 kubelet[1967]: I1213 01:54:54.997210 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-9cfrv" podStartSLOduration=20.543049504 podStartE2EDuration="24.997179374s" podCreationTimestamp="2024-12-13 01:54:30 +0000 UTC" firstStartedPulling="2024-12-13 01:54:42.594021022 +0000 UTC m=+34.319539881" lastFinishedPulling="2024-12-13 01:54:47.048150992 +0000 UTC m=+38.773669751" observedRunningTime="2024-12-13 01:54:47.268885677 +0000 UTC m=+38.994404536" watchObservedRunningTime="2024-12-13 01:54:54.997179374 +0000 UTC m=+46.722698133" Dec 13 01:54:54.998383 kubelet[1967]: I1213 01:54:54.997731 1967 topology_manager.go:215] "Topology Admit Handler" podUID="6e1fe5ba-2697-4767-b532-209da57bea63" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 01:54:55.011076 kernel: audit: type=1300 audit(1734054894.965:704): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffee9d08b90 a2=0 a3=0 items=0 ppid=2172 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.010901 systemd[1]: Created slice kubepods-besteffort-pod6e1fe5ba_2697_4767_b532_209da57bea63.slice. Dec 13 01:54:54.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:55.011526 kubelet[1967]: I1213 01:54:55.009901 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/6e1fe5ba-2697-4767-b532-209da57bea63-data\") pod \"nfs-server-provisioner-0\" (UID: \"6e1fe5ba-2697-4767-b532-209da57bea63\") " pod="default/nfs-server-provisioner-0" Dec 13 01:54:55.012052 kubelet[1967]: I1213 01:54:55.012034 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tml2p\" (UniqueName: \"kubernetes.io/projected/6e1fe5ba-2697-4767-b532-209da57bea63-kube-api-access-tml2p\") pod \"nfs-server-provisioner-0\" (UID: \"6e1fe5ba-2697-4767-b532-209da57bea63\") " pod="default/nfs-server-provisioner-0" Dec 13 01:54:55.016000 audit[3148]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:55.031495 kernel: audit: type=1327 audit(1734054894.965:704): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:55.031564 kernel: audit: type=1325 audit(1734054895.016:705): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:55.031590 kernel: audit: type=1300 audit(1734054895.016:705): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdc815c0f0 a2=0 a3=7ffdc815c0dc items=0 ppid=2172 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.016000 audit[3148]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdc815c0f0 a2=0 a3=7ffdc815c0dc items=0 ppid=2172 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.016000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:55.050000 audit[3148]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:55.071663 kernel: audit: type=1327 audit(1734054895.016:705): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:55.071743 kernel: audit: type=1325 audit(1734054895.050:706): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:54:55.050000 audit[3148]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdc815c0f0 a2=0 a3=0 items=0 ppid=2172 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.050000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:54:55.096464 kubelet[1967]: E1213 01:54:55.096428 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:55.316729 env[1436]: time="2024-12-13T01:54:55.315926095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6e1fe5ba-2697-4767-b532-209da57bea63,Namespace:default,Attempt:0,}" Dec 13 01:54:55.484388 systemd-networkd[1587]: cali60e51b789ff: Link UP Dec 13 01:54:55.490920 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:54:55.491031 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 01:54:55.491404 systemd-networkd[1587]: cali60e51b789ff: Gained carrier Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.405 [INFO][3150] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.19-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 6e1fe5ba-2697-4767-b532-209da57bea63 1303 0 2024-12-13 01:54:54 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.19 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.19-k8s-nfs--server--provisioner--0-" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.405 [INFO][3150] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.430 [INFO][3162] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" HandleID="k8s-pod-network.137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Workload="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.442 [INFO][3162] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" HandleID="k8s-pod-network.137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Workload="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051ce0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.19", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 01:54:55.430377559 +0000 UTC"}, Hostname:"10.200.8.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.442 [INFO][3162] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.442 [INFO][3162] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.442 [INFO][3162] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.19' Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.444 [INFO][3162] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" host="10.200.8.19" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.448 [INFO][3162] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.19" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.451 [INFO][3162] ipam/ipam.go 489: Trying affinity for 192.168.41.128/26 host="10.200.8.19" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.452 [INFO][3162] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.128/26 host="10.200.8.19" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.455 [INFO][3162] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="10.200.8.19" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.455 [INFO][3162] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" host="10.200.8.19" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.457 [INFO][3162] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2 Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.462 [INFO][3162] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" host="10.200.8.19" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.474 [INFO][3162] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.131/26] block=192.168.41.128/26 handle="k8s-pod-network.137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" host="10.200.8.19" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.474 [INFO][3162] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.131/26] handle="k8s-pod-network.137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" host="10.200.8.19" Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.474 [INFO][3162] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:54:55.508087 env[1436]: 2024-12-13 01:54:55.474 [INFO][3162] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.131/26] IPv6=[] ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" HandleID="k8s-pod-network.137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Workload="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:54:55.509069 env[1436]: 2024-12-13 01:54:55.475 [INFO][3150] cni-plugin/k8s.go 386: Populated endpoint ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6e1fe5ba-2697-4767-b532-209da57bea63", ResourceVersion:"1303", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.41.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:54:55.509069 env[1436]: 2024-12-13 01:54:55.476 [INFO][3150] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.131/32] ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:54:55.509069 env[1436]: 2024-12-13 01:54:55.476 [INFO][3150] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:54:55.509069 env[1436]: 2024-12-13 01:54:55.492 [INFO][3150] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:54:55.509349 env[1436]: 2024-12-13 01:54:55.492 [INFO][3150] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6e1fe5ba-2697-4767-b532-209da57bea63", ResourceVersion:"1303", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.41.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"02:4a:6e:4e:f6:b4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:54:55.509349 env[1436]: 2024-12-13 01:54:55.504 [INFO][3150] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:54:55.523000 audit[3183]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3183 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:54:55.523000 audit[3183]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fffeb090b10 a2=0 a3=7fffeb090afc items=0 ppid=2565 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.523000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:54:55.529880 env[1436]: time="2024-12-13T01:54:55.529802657Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:54:55.530057 env[1436]: time="2024-12-13T01:54:55.529850758Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:54:55.530057 env[1436]: time="2024-12-13T01:54:55.529865158Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:54:55.530202 env[1436]: time="2024-12-13T01:54:55.530109260Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2 pid=3192 runtime=io.containerd.runc.v2 Dec 13 01:54:55.548504 systemd[1]: Started cri-containerd-137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2.scope. Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.566000 audit: BPF prog-id=113 op=LOAD Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3192 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373336336562363939363639653533313339313633353963336136 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3192 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373336336562363939363639653533313339313633353963336136 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.567000 audit: BPF prog-id=114 op=LOAD Dec 13 01:54:55.567000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002298c0 items=0 ppid=3192 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373336336562363939363639653533313339313633353963336136 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit: BPF prog-id=115 op=LOAD Dec 13 01:54:55.569000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000229908 items=0 ppid=3192 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373336336562363939363639653533313339313633353963336136 Dec 13 01:54:55.569000 audit: BPF prog-id=115 op=UNLOAD Dec 13 01:54:55.569000 audit: BPF prog-id=114 op=UNLOAD Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:55.569000 audit: BPF prog-id=116 op=LOAD Dec 13 01:54:55.569000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000229d18 items=0 ppid=3192 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:55.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373336336562363939363639653533313339313633353963336136 Dec 13 01:54:55.606851 env[1436]: time="2024-12-13T01:54:55.606814707Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6e1fe5ba-2697-4767-b532-209da57bea63,Namespace:default,Attempt:0,} returns sandbox id \"137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2\"" Dec 13 01:54:55.608508 env[1436]: time="2024-12-13T01:54:55.608485026Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 01:54:56.097102 kubelet[1967]: E1213 01:54:56.097051 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:56.857685 systemd-networkd[1587]: cali60e51b789ff: Gained IPv6LL Dec 13 01:54:57.343712 kubelet[1967]: E1213 01:54:57.097754 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:58.098467 kubelet[1967]: E1213 01:54:58.098411 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:59.099187 kubelet[1967]: E1213 01:54:59.099130 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:00.100191 kubelet[1967]: E1213 01:55:00.100132 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:01.100337 kubelet[1967]: E1213 01:55:01.100285 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:02.100484 kubelet[1967]: E1213 01:55:02.100427 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:02.330804 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3225894931.mount: Deactivated successfully. Dec 13 01:55:03.100604 kubelet[1967]: E1213 01:55:03.100555 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:04.101090 kubelet[1967]: E1213 01:55:04.101030 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:04.416662 env[1436]: time="2024-12-13T01:55:04.416380822Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:04.425108 env[1436]: time="2024-12-13T01:55:04.425067603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:04.429652 env[1436]: time="2024-12-13T01:55:04.429548744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:04.434456 env[1436]: time="2024-12-13T01:55:04.434371289Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:04.435675 env[1436]: time="2024-12-13T01:55:04.435637001Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 01:55:04.438669 env[1436]: time="2024-12-13T01:55:04.438639929Z" level=info msg="CreateContainer within sandbox \"137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 01:55:04.480364 env[1436]: time="2024-12-13T01:55:04.480329116Z" level=info msg="CreateContainer within sandbox \"137363eb699669e5313916359c3a695b752c53ab39c1a1cf270ce4ebdd9ed0d2\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"3ba7b32bc15cc9c07f00215401afdd65b07e30f6469ae483c2976f4f90556000\"" Dec 13 01:55:04.480861 env[1436]: time="2024-12-13T01:55:04.480835521Z" level=info msg="StartContainer for \"3ba7b32bc15cc9c07f00215401afdd65b07e30f6469ae483c2976f4f90556000\"" Dec 13 01:55:04.500869 systemd[1]: Started cri-containerd-3ba7b32bc15cc9c07f00215401afdd65b07e30f6469ae483c2976f4f90556000.scope. Dec 13 01:55:04.543007 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 01:55:04.543132 kernel: audit: type=1400 audit(1734054904.524:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.577144 kernel: audit: type=1400 audit(1734054904.524:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.577235 kernel: audit: type=1400 audit(1734054904.525:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.607256 kernel: audit: type=1400 audit(1734054904.525:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.607349 kernel: audit: type=1400 audit(1734054904.525:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.607622 env[1436]: time="2024-12-13T01:55:04.607589100Z" level=info msg="StartContainer for \"3ba7b32bc15cc9c07f00215401afdd65b07e30f6469ae483c2976f4f90556000\" returns successfully" Dec 13 01:55:04.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.636296 kernel: audit: type=1400 audit(1734054904.525:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.636389 kernel: audit: type=1400 audit(1734054904.525:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.650844 kernel: audit: type=1400 audit(1734054904.525:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.676091 kernel: audit: type=1400 audit(1734054904.525:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.676172 kernel: audit: type=1400 audit(1734054904.542:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.542000 audit: BPF prog-id=117 op=LOAD Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3192 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:04.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613762333262633135636339633037663030323135343031616664 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3192 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:04.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613762333262633135636339633037663030323135343031616664 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit: BPF prog-id=118 op=LOAD Dec 13 01:55:04.543000 audit[3246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003aedc0 items=0 ppid=3192 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:04.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613762333262633135636339633037663030323135343031616664 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit: BPF prog-id=119 op=LOAD Dec 13 01:55:04.543000 audit[3246]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003aee08 items=0 ppid=3192 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:04.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613762333262633135636339633037663030323135343031616664 Dec 13 01:55:04.543000 audit: BPF prog-id=119 op=UNLOAD Dec 13 01:55:04.543000 audit: BPF prog-id=118 op=UNLOAD Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { perfmon } for pid=3246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit[3246]: AVC avc: denied { bpf } for pid=3246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:04.543000 audit: BPF prog-id=120 op=LOAD Dec 13 01:55:04.543000 audit[3246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003af218 items=0 ppid=3192 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:04.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613762333262633135636339633037663030323135343031616664 Dec 13 01:55:04.613000 audit[3275]: AVC avc: denied { search } for pid=3275 comm="rpcbind" name="crypto" dev="proc" ino=26420 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 01:55:04.613000 audit[3275]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f59d88e20c0 a2=0 a3=0 items=0 ppid=3258 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 key=(null) Dec 13 01:55:04.613000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 01:55:04.683000 audit[3280]: AVC avc: denied { search } for pid=3280 comm="dbus-daemon" name="crypto" dev="proc" ino=26420 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 01:55:04.683000 audit[3280]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4a993170c0 a2=0 a3=0 items=0 ppid=3258 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 key=(null) Dec 13 01:55:04.683000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 01:55:04.686000 audit[3281]: AVC avc: denied { watch } for pid=3281 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c173,c238 tclass=dir permissive=0 Dec 13 01:55:04.686000 audit[3281]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55f99e710940 a2=2c8 a3=7ffda84ab4ac items=0 ppid=3258 pid=3281 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 key=(null) Dec 13 01:55:04.686000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 01:55:04.691000 audit[3282]: AVC avc: denied { read } for pid=3282 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26519 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 01:55:04.691000 audit[3282]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7feeb0176320 a1=80000 a2=d a3=7ffeda55c160 items=0 ppid=3258 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 key=(null) Dec 13 01:55:04.691000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 01:55:04.692000 audit[3282]: AVC avc: denied { search } for pid=3282 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26420 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 01:55:04.692000 audit[3282]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7feeaf6ca0c0 a2=0 a3=0 items=0 ppid=3258 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c238 key=(null) Dec 13 01:55:04.692000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 01:55:05.102291 kubelet[1967]: E1213 01:55:05.102187 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:05.303953 kubelet[1967]: I1213 01:55:05.303901 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.474863132 podStartE2EDuration="11.303884525s" podCreationTimestamp="2024-12-13 01:54:54 +0000 UTC" firstStartedPulling="2024-12-13 01:54:55.608015621 +0000 UTC m=+47.333534380" lastFinishedPulling="2024-12-13 01:55:04.437037014 +0000 UTC m=+56.162555773" observedRunningTime="2024-12-13 01:55:05.303676624 +0000 UTC m=+57.029195483" watchObservedRunningTime="2024-12-13 01:55:05.303884525 +0000 UTC m=+57.029403284" Dec 13 01:55:05.317000 audit[3287]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:05.317000 audit[3287]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffceecaa330 a2=0 a3=7ffceecaa31c items=0 ppid=2172 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:05.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:05.323000 audit[3287]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:05.323000 audit[3287]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffceecaa330 a2=0 a3=7ffceecaa31c items=0 ppid=2172 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:05.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:06.102942 kubelet[1967]: E1213 01:55:06.102882 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:06.432591 systemd[1]: run-containerd-runc-k8s.io-e494f193d99495ca08d617315b8570bf8834ecdcc51f2518f27aeefc63b951ad-runc.fhiqkm.mount: Deactivated successfully. Dec 13 01:55:07.103388 kubelet[1967]: E1213 01:55:07.103345 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:08.104509 kubelet[1967]: E1213 01:55:08.104446 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:09.064638 kubelet[1967]: E1213 01:55:09.064580 1967 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:09.098620 env[1436]: time="2024-12-13T01:55:09.098578890Z" level=info msg="StopPodSandbox for \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\"" Dec 13 01:55:09.104922 kubelet[1967]: E1213 01:55:09.104871 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.132 [WARNING][3324] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-csi--node--driver--tw8wx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f8f1613-73c8-4ce1-870f-3681b1103b18", ResourceVersion:"1255", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22", Pod:"csi-node-driver-tw8wx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5c4799d63ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.132 [INFO][3324] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.132 [INFO][3324] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" iface="eth0" netns="" Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.132 [INFO][3324] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.132 [INFO][3324] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.153 [INFO][3330] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" HandleID="k8s-pod-network.635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.153 [INFO][3330] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.154 [INFO][3330] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.160 [WARNING][3330] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" HandleID="k8s-pod-network.635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.160 [INFO][3330] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" HandleID="k8s-pod-network.635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.162 [INFO][3330] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:09.164195 env[1436]: 2024-12-13 01:55:09.163 [INFO][3324] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:55:09.164835 env[1436]: time="2024-12-13T01:55:09.164373451Z" level=info msg="TearDown network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\" successfully" Dec 13 01:55:09.164835 env[1436]: time="2024-12-13T01:55:09.164407352Z" level=info msg="StopPodSandbox for \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\" returns successfully" Dec 13 01:55:09.165126 env[1436]: time="2024-12-13T01:55:09.165089157Z" level=info msg="RemovePodSandbox for \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\"" Dec 13 01:55:09.165232 env[1436]: time="2024-12-13T01:55:09.165124958Z" level=info msg="Forcibly stopping sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\"" Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.199 [WARNING][3353] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-csi--node--driver--tw8wx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f8f1613-73c8-4ce1-870f-3681b1103b18", ResourceVersion:"1255", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"b4b8b124c6eb5dc425fbf4c0511ed225b67f1b2bb364d5e65fbdb7555cecee22", Pod:"csi-node-driver-tw8wx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5c4799d63ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.200 [INFO][3353] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.200 [INFO][3353] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" iface="eth0" netns="" Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.200 [INFO][3353] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.200 [INFO][3353] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.220 [INFO][3359] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" HandleID="k8s-pod-network.635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.220 [INFO][3359] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.220 [INFO][3359] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.226 [WARNING][3359] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" HandleID="k8s-pod-network.635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.226 [INFO][3359] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" HandleID="k8s-pod-network.635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Workload="10.200.8.19-k8s-csi--node--driver--tw8wx-eth0" Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.227 [INFO][3359] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:09.229397 env[1436]: 2024-12-13 01:55:09.228 [INFO][3353] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d" Dec 13 01:55:09.230085 env[1436]: time="2024-12-13T01:55:09.229423706Z" level=info msg="TearDown network for sandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\" successfully" Dec 13 01:55:09.240530 env[1436]: time="2024-12-13T01:55:09.240489000Z" level=info msg="RemovePodSandbox \"635f22655c2b3231119a4160b17e9b63803df1fa8ccd3a7800d1301a5b51240d\" returns successfully" Dec 13 01:55:09.241321 env[1436]: time="2024-12-13T01:55:09.241274507Z" level=info msg="StopPodSandbox for \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\"" Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.278 [WARNING][3380] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"4e913986-999f-44b8-bb55-12d64d75cc5f", ResourceVersion:"1267", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b", Pod:"nginx-deployment-85f456d6dd-9cfrv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califebd15ee342", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.278 [INFO][3380] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.278 [INFO][3380] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" iface="eth0" netns="" Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.278 [INFO][3380] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.278 [INFO][3380] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.295 [INFO][3386] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" HandleID="k8s-pod-network.b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.296 [INFO][3386] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.296 [INFO][3386] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.305 [WARNING][3386] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" HandleID="k8s-pod-network.b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.305 [INFO][3386] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" HandleID="k8s-pod-network.b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.307 [INFO][3386] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:09.309510 env[1436]: 2024-12-13 01:55:09.308 [INFO][3380] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:55:09.310053 env[1436]: time="2024-12-13T01:55:09.309551289Z" level=info msg="TearDown network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\" successfully" Dec 13 01:55:09.310053 env[1436]: time="2024-12-13T01:55:09.309579489Z" level=info msg="StopPodSandbox for \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\" returns successfully" Dec 13 01:55:09.310383 env[1436]: time="2024-12-13T01:55:09.310350796Z" level=info msg="RemovePodSandbox for \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\"" Dec 13 01:55:09.310507 env[1436]: time="2024-12-13T01:55:09.310380496Z" level=info msg="Forcibly stopping sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\"" Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.344 [WARNING][3404] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"4e913986-999f-44b8-bb55-12d64d75cc5f", ResourceVersion:"1267", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"878ac6c9003bd611d99e067b8ff99b46971c6a0b2a13ed929975ca51f87eeb1b", Pod:"nginx-deployment-85f456d6dd-9cfrv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califebd15ee342", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.344 [INFO][3404] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.344 [INFO][3404] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" iface="eth0" netns="" Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.344 [INFO][3404] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.344 [INFO][3404] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.364 [INFO][3410] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" HandleID="k8s-pod-network.b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.365 [INFO][3410] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.365 [INFO][3410] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.377 [WARNING][3410] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" HandleID="k8s-pod-network.b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.377 [INFO][3410] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" HandleID="k8s-pod-network.b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Workload="10.200.8.19-k8s-nginx--deployment--85f456d6dd--9cfrv-eth0" Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.379 [INFO][3410] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:09.380823 env[1436]: 2024-12-13 01:55:09.379 [INFO][3404] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5" Dec 13 01:55:09.381504 env[1436]: time="2024-12-13T01:55:09.380840497Z" level=info msg="TearDown network for sandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\" successfully" Dec 13 01:55:09.391894 env[1436]: time="2024-12-13T01:55:09.391801690Z" level=info msg="RemovePodSandbox \"b533dcfbc69687fc3b4802a588596fa562bbfa783a78c1ae6715cb64be54c6a5\" returns successfully" Dec 13 01:55:10.105401 kubelet[1967]: E1213 01:55:10.105343 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:11.105746 kubelet[1967]: E1213 01:55:11.105623 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:12.106760 kubelet[1967]: E1213 01:55:12.106704 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:13.107114 kubelet[1967]: E1213 01:55:13.107057 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:14.107979 kubelet[1967]: E1213 01:55:14.107856 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:15.109043 kubelet[1967]: E1213 01:55:15.108954 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:16.110073 kubelet[1967]: E1213 01:55:16.110015 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:17.110670 kubelet[1967]: E1213 01:55:17.110612 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:18.110827 kubelet[1967]: E1213 01:55:18.110766 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:19.111212 kubelet[1967]: E1213 01:55:19.111150 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:20.111680 kubelet[1967]: E1213 01:55:20.111622 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:21.112047 kubelet[1967]: E1213 01:55:21.111983 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:22.113104 kubelet[1967]: E1213 01:55:22.113008 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:23.113802 kubelet[1967]: E1213 01:55:23.113743 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:24.114248 kubelet[1967]: E1213 01:55:24.114182 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:25.114743 kubelet[1967]: E1213 01:55:25.114690 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:26.114984 kubelet[1967]: E1213 01:55:26.114917 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:27.116122 kubelet[1967]: E1213 01:55:27.116058 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:28.116228 kubelet[1967]: E1213 01:55:28.116164 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:28.999702 kubelet[1967]: I1213 01:55:28.999641 1967 topology_manager.go:215] "Topology Admit Handler" podUID="ce41037f-d869-4fb5-9f9e-14489682a969" podNamespace="default" podName="test-pod-1" Dec 13 01:55:29.005380 systemd[1]: Created slice kubepods-besteffort-podce41037f_d869_4fb5_9f9e_14489682a969.slice. Dec 13 01:55:29.064640 kubelet[1967]: E1213 01:55:29.064593 1967 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:29.116708 kubelet[1967]: E1213 01:55:29.116665 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:29.118905 kubelet[1967]: I1213 01:55:29.118871 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-1a39f1ab-0427-4a31-8d95-dd280de207fd\" (UniqueName: \"kubernetes.io/nfs/ce41037f-d869-4fb5-9f9e-14489682a969-pvc-1a39f1ab-0427-4a31-8d95-dd280de207fd\") pod \"test-pod-1\" (UID: \"ce41037f-d869-4fb5-9f9e-14489682a969\") " pod="default/test-pod-1" Dec 13 01:55:29.119091 kubelet[1967]: I1213 01:55:29.119070 1967 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pnv59\" (UniqueName: \"kubernetes.io/projected/ce41037f-d869-4fb5-9f9e-14489682a969-kube-api-access-pnv59\") pod \"test-pod-1\" (UID: \"ce41037f-d869-4fb5-9f9e-14489682a969\") " pod="default/test-pod-1" Dec 13 01:55:29.325846 kernel: Failed to create system directory netfs Dec 13 01:55:29.325994 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 01:55:29.326018 kernel: audit: type=1400 audit(1734054929.319:751): avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.319000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.346241 kernel: Failed to create system directory netfs Dec 13 01:55:29.346356 kernel: audit: type=1400 audit(1734054929.319:751): avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.319000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.371093 kernel: Failed to create system directory netfs Dec 13 01:55:29.371225 kernel: audit: type=1400 audit(1734054929.319:751): avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.371255 kernel: Failed to create system directory netfs Dec 13 01:55:29.319000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.406804 kernel: audit: type=1400 audit(1734054929.319:751): avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.319000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.319000 audit[3445]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b74516a5e0 a1=153bc a2=55b723c762b0 a3=5 items=0 ppid=50 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:29.319000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:55:29.432689 kernel: audit: type=1300 audit(1734054929.319:751): arch=c000003e syscall=175 success=yes exit=0 a0=55b74516a5e0 a1=153bc a2=55b723c762b0 a3=5 items=0 ppid=50 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:29.432959 kernel: audit: type=1327 audit(1734054929.319:751): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:55:29.458651 kernel: Failed to create system directory fscache Dec 13 01:55:29.458767 kernel: audit: type=1400 audit(1734054929.435:752): avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.458791 kernel: Failed to create system directory fscache Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.479660 kernel: audit: type=1400 audit(1734054929.435:752): avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.479788 kernel: Failed to create system directory fscache Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.499155 kernel: audit: type=1400 audit(1734054929.435:752): avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.499272 kernel: Failed to create system directory fscache Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.519069 kernel: audit: type=1400 audit(1734054929.435:752): avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.519169 kernel: Failed to create system directory fscache Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.526327 kernel: Failed to create system directory fscache Dec 13 01:55:29.526411 kernel: Failed to create system directory fscache Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.533578 kernel: Failed to create system directory fscache Dec 13 01:55:29.533645 kernel: Failed to create system directory fscache Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.540557 kernel: Failed to create system directory fscache Dec 13 01:55:29.540620 kernel: Failed to create system directory fscache Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.547537 kernel: Failed to create system directory fscache Dec 13 01:55:29.547595 kernel: Failed to create system directory fscache Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.435000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.555329 kernel: Failed to create system directory fscache Dec 13 01:55:29.435000 audit[3445]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b74537f9c0 a1=4c0fc a2=55b723c762b0 a3=5 items=0 ppid=50 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:29.435000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:55:29.559328 kernel: FS-Cache: Loaded Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.680143 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.680235 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.680259 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.688080 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.688147 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.694595 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.694668 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.702081 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.702151 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.708535 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.708601 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.714788 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.714854 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.721001 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.721067 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.724932 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.730224 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.730287 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.733324 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.739192 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.739245 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.745012 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.745066 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.750805 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.750862 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.756516 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.756578 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.762173 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.762229 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.764966 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.770419 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.770485 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.775883 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.775949 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.781854 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.781906 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.787083 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.787144 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.792382 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.792440 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.798953 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.799016 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.802326 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.809752 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.809799 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.809823 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.814934 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.814983 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.820074 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.820123 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.825314 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.825367 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.830571 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.830619 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.835753 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.835811 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.840811 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.840856 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.846226 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.846269 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.851281 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.851348 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.856749 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.856795 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.862076 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.862123 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.867345 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.867399 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.872504 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.872548 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.877932 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.877990 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.882910 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.882962 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.886325 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.888365 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.893523 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.893571 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.900328 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.900381 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.905447 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.905493 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.910705 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.910752 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.915885 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.915949 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.921147 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.921191 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.926293 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.926360 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.931751 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.931809 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.936523 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.936587 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.941615 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.941679 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.946728 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.946785 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.952135 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.952182 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.957342 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.957402 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.962429 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.962485 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.967607 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.967657 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.972738 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.972796 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.977967 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.978024 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.983345 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.983392 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.988578 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.988645 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.995053 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.995615 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.007181 kernel: Failed to create system directory sunrpc Dec 13 01:55:30.007228 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.012999 kernel: Failed to create system directory sunrpc Dec 13 01:55:30.013050 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.018325 kernel: Failed to create system directory sunrpc Dec 13 01:55:30.018378 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.023535 kernel: Failed to create system directory sunrpc Dec 13 01:55:30.023582 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.026358 kernel: Failed to create system directory sunrpc Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:29.659000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.033313 kernel: Failed to create system directory sunrpc Dec 13 01:55:30.045644 kernel: RPC: Registered named UNIX socket transport module. Dec 13 01:55:30.045708 kernel: RPC: Registered udp transport module. Dec 13 01:55:30.045734 kernel: RPC: Registered tcp transport module. Dec 13 01:55:30.048277 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 01:55:29.659000 audit[3445]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b7453cbad0 a1=1a7f1c a2=55b723c762b0 a3=5 items=6 ppid=50 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:29.659000 audit: CWD cwd="/" Dec 13 01:55:29.659000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:29.659000 audit: PATH item=1 name=(null) inode=27908 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:29.659000 audit: PATH item=2 name=(null) inode=27908 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:29.659000 audit: PATH item=3 name=(null) inode=27909 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:29.659000 audit: PATH item=4 name=(null) inode=27908 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:29.659000 audit: PATH item=5 name=(null) inode=27910 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:29.659000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:55:30.117909 kubelet[1967]: E1213 01:55:30.117855 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.239755 kernel: Failed to create system directory nfs Dec 13 01:55:30.239828 kernel: Failed to create system directory nfs Dec 13 01:55:30.239850 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.244893 kernel: Failed to create system directory nfs Dec 13 01:55:30.244946 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.249809 kernel: Failed to create system directory nfs Dec 13 01:55:30.249861 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.254750 kernel: Failed to create system directory nfs Dec 13 01:55:30.254791 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.259809 kernel: Failed to create system directory nfs Dec 13 01:55:30.259848 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.265033 kernel: Failed to create system directory nfs Dec 13 01:55:30.265082 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.268320 kernel: Failed to create system directory nfs Dec 13 01:55:30.270825 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.275036 kernel: Failed to create system directory nfs Dec 13 01:55:30.275087 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.279930 kernel: Failed to create system directory nfs Dec 13 01:55:30.279975 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.285374 kernel: Failed to create system directory nfs Dec 13 01:55:30.285427 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.290327 kernel: Failed to create system directory nfs Dec 13 01:55:30.290377 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.295327 kernel: Failed to create system directory nfs Dec 13 01:55:30.295375 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.300317 kernel: Failed to create system directory nfs Dec 13 01:55:30.300369 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.305331 kernel: Failed to create system directory nfs Dec 13 01:55:30.305378 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.310370 kernel: Failed to create system directory nfs Dec 13 01:55:30.310420 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.316179 kernel: Failed to create system directory nfs Dec 13 01:55:30.316219 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.321132 kernel: Failed to create system directory nfs Dec 13 01:55:30.321752 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.326340 kernel: Failed to create system directory nfs Dec 13 01:55:30.326389 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.333250 kernel: Failed to create system directory nfs Dec 13 01:55:30.333311 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.338259 kernel: Failed to create system directory nfs Dec 13 01:55:30.338339 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.343506 kernel: Failed to create system directory nfs Dec 13 01:55:30.343560 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.348506 kernel: Failed to create system directory nfs Dec 13 01:55:30.348562 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.353274 kernel: Failed to create system directory nfs Dec 13 01:55:30.353360 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.358038 kernel: Failed to create system directory nfs Dec 13 01:55:30.358092 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.363162 kernel: Failed to create system directory nfs Dec 13 01:55:30.363217 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.368004 kernel: Failed to create system directory nfs Dec 13 01:55:30.368052 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.373471 kernel: Failed to create system directory nfs Dec 13 01:55:30.374223 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.381008 kernel: Failed to create system directory nfs Dec 13 01:55:30.381727 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.386847 kernel: Failed to create system directory nfs Dec 13 01:55:30.386907 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.223000 audit[3445]: AVC avc: denied { confidentiality } for pid=3445 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.392315 kernel: Failed to create system directory nfs Dec 13 01:55:30.223000 audit[3445]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b7455ec700 a1=16e97c a2=55b723c762b0 a3=5 items=0 ppid=50 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:30.223000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:55:30.416330 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.529294 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.529399 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.529427 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.534411 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.537140 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.537319 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.542108 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.542161 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.549417 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.549486 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.554481 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.554523 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.563469 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.563528 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.563547 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.569949 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.570001 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.576869 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.576922 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.582818 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.582890 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.589032 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.589088 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.594745 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.594795 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.599807 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.599851 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.604906 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.604954 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.610143 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.610183 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.615175 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.615224 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.620415 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.620457 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.626816 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.629115 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.633625 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.633693 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.636325 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.639345 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.643924 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.643985 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.650669 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.650714 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.655782 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.655829 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.660746 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.660790 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.665793 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.665853 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.670730 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.670790 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.675636 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.675673 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.678742 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.683277 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.683331 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.688556 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.688595 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.693596 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.693657 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.696385 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.699353 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.704363 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.704415 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.707353 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.712445 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.712505 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.717689 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.717790 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.722952 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.723028 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.727583 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.727633 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.732434 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.735611 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.735648 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.740788 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.740827 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.743587 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.751279 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.754324 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.754387 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.757363 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.763655 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.763730 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.768736 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.768776 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.771674 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.779407 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.779462 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.784001 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.508000 audit[3450]: AVC avc: denied { confidentiality } for pid=3450 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:30.787528 kernel: Failed to create system directory nfs4 Dec 13 01:55:30.922942 kernel: NFS: Registering the id_resolver key type Dec 13 01:55:30.923069 kernel: Key type id_resolver registered Dec 13 01:55:30.923090 kernel: Key type id_legacy registered Dec 13 01:55:30.508000 audit[3450]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5d56ebc010 a1=208de4 a2=556462ba92b0 a3=5 items=0 ppid=50 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:30.508000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.015585 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.015651 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.015671 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.021080 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.021125 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.026598 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.026654 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.029368 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.034669 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.034744 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.039985 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.040049 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.045505 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.045558 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.050962 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.051023 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.056739 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.056792 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.062011 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.062636 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.065352 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.070317 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.070377 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.077480 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.077552 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.005000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:31.082873 kernel: Failed to create system directory rpcgss Dec 13 01:55:31.005000 audit[3451]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb58b00d010 a1=70af4 a2=55e70ca422b0 a3=5 items=0 ppid=50 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.005000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 01:55:31.118257 kubelet[1967]: E1213 01:55:31.118218 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:31.284642 nfsidmap[3457]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-39e591e923' Dec 13 01:55:31.306212 nfsidmap[3458]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-39e591e923' Dec 13 01:55:31.317000 audit[1543]: AVC avc: denied { watch_reads } for pid=1543 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2777 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:55:31.317000 audit[1543]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561c470d8050 a2=10 a3=657545d10e5a0d5b items=0 ppid=1 pid=1543 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.317000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 01:55:31.317000 audit[1543]: AVC avc: denied { watch_reads } for pid=1543 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2777 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:55:31.317000 audit[1543]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561c470d8050 a2=10 a3=657545d10e5a0d5b items=0 ppid=1 pid=1543 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.317000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 01:55:31.317000 audit[1543]: AVC avc: denied { watch_reads } for pid=1543 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2777 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:55:31.317000 audit[1543]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561c470d8050 a2=10 a3=657545d10e5a0d5b items=0 ppid=1 pid=1543 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.317000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 01:55:31.318000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2777 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:55:31.318000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2777 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:55:31.318000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2777 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:55:31.409347 env[1436]: time="2024-12-13T01:55:31.409277460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ce41037f-d869-4fb5-9f9e-14489682a969,Namespace:default,Attempt:0,}" Dec 13 01:55:31.545795 systemd-networkd[1587]: cali5ec59c6bf6e: Link UP Dec 13 01:55:31.554930 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:55:31.555009 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 01:55:31.555272 systemd-networkd[1587]: cali5ec59c6bf6e: Gained carrier Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.481 [INFO][3460] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.19-k8s-test--pod--1-eth0 default ce41037f-d869-4fb5-9f9e-14489682a969 1410 0 2024-12-13 01:54:56 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.19 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.19-k8s-test--pod--1-" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.481 [INFO][3460] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.19-k8s-test--pod--1-eth0" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.505 [INFO][3471] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" HandleID="k8s-pod-network.a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Workload="10.200.8.19-k8s-test--pod--1-eth0" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.516 [INFO][3471] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" HandleID="k8s-pod-network.a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Workload="10.200.8.19-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292b70), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.19", "pod":"test-pod-1", "timestamp":"2024-12-13 01:55:31.50504296 +0000 UTC"}, Hostname:"10.200.8.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.516 [INFO][3471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.516 [INFO][3471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.516 [INFO][3471] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.19' Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.517 [INFO][3471] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" host="10.200.8.19" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.520 [INFO][3471] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.19" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.523 [INFO][3471] ipam/ipam.go 489: Trying affinity for 192.168.41.128/26 host="10.200.8.19" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.524 [INFO][3471] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.128/26 host="10.200.8.19" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.526 [INFO][3471] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="10.200.8.19" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.526 [INFO][3471] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" host="10.200.8.19" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.527 [INFO][3471] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1 Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.532 [INFO][3471] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" host="10.200.8.19" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.541 [INFO][3471] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.132/26] block=192.168.41.128/26 handle="k8s-pod-network.a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" host="10.200.8.19" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.541 [INFO][3471] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.132/26] handle="k8s-pod-network.a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" host="10.200.8.19" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.541 [INFO][3471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.541 [INFO][3471] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.132/26] IPv6=[] ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" HandleID="k8s-pod-network.a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Workload="10.200.8.19-k8s-test--pod--1-eth0" Dec 13 01:55:31.566974 env[1436]: 2024-12-13 01:55:31.542 [INFO][3460] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ce41037f-d869-4fb5-9f9e-14489682a969", ResourceVersion:"1410", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:31.568006 env[1436]: 2024-12-13 01:55:31.542 [INFO][3460] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.132/32] ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.19-k8s-test--pod--1-eth0" Dec 13 01:55:31.568006 env[1436]: 2024-12-13 01:55:31.542 [INFO][3460] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.19-k8s-test--pod--1-eth0" Dec 13 01:55:31.568006 env[1436]: 2024-12-13 01:55:31.557 [INFO][3460] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.19-k8s-test--pod--1-eth0" Dec 13 01:55:31.568006 env[1436]: 2024-12-13 01:55:31.557 [INFO][3460] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ce41037f-d869-4fb5-9f9e-14489682a969", ResourceVersion:"1410", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.19", ContainerID:"a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"9a:68:25:bf:67:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:31.568006 env[1436]: 2024-12-13 01:55:31.565 [INFO][3460] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.19-k8s-test--pod--1-eth0" Dec 13 01:55:31.581000 audit[3491]: NETFILTER_CFG table=filter:81 family=2 entries=44 op=nft_register_chain pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:55:31.581000 audit[3491]: SYSCALL arch=c000003e syscall=46 success=yes exit=22252 a0=3 a1=7ffc4247c350 a2=0 a3=7ffc4247c33c items=0 ppid=2565 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.581000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:55:31.592580 env[1436]: time="2024-12-13T01:55:31.592519008Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:31.592732 env[1436]: time="2024-12-13T01:55:31.592554808Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:31.592732 env[1436]: time="2024-12-13T01:55:31.592567908Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:31.592872 env[1436]: time="2024-12-13T01:55:31.592799210Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1 pid=3499 runtime=io.containerd.runc.v2 Dec 13 01:55:31.610994 systemd[1]: Started cri-containerd-a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1.scope. Dec 13 01:55:31.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.626000 audit: BPF prog-id=121 op=LOAD Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132666539313664333735393835376565633234363565346530333134 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132666539313664333735393835376565633234363565346530333134 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit: BPF prog-id=122 op=LOAD Dec 13 01:55:31.627000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099120 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132666539313664333735393835376565633234363565346530333134 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.627000 audit: BPF prog-id=123 op=LOAD Dec 13 01:55:31.627000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099168 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132666539313664333735393835376565633234363565346530333134 Dec 13 01:55:31.628000 audit: BPF prog-id=123 op=UNLOAD Dec 13 01:55:31.628000 audit: BPF prog-id=122 op=UNLOAD Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:31.628000 audit: BPF prog-id=124 op=LOAD Dec 13 01:55:31.628000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099578 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:31.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132666539313664333735393835376565633234363565346530333134 Dec 13 01:55:31.655649 env[1436]: time="2024-12-13T01:55:31.655609203Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ce41037f-d869-4fb5-9f9e-14489682a969,Namespace:default,Attempt:0,} returns sandbox id \"a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1\"" Dec 13 01:55:31.657634 env[1436]: time="2024-12-13T01:55:31.657561615Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 01:55:31.960132 env[1436]: time="2024-12-13T01:55:31.960082710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:31.968629 env[1436]: time="2024-12-13T01:55:31.968590764Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:31.974338 env[1436]: time="2024-12-13T01:55:31.974292499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:31.982051 env[1436]: time="2024-12-13T01:55:31.982019548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:31.982675 env[1436]: time="2024-12-13T01:55:31.982642852Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 01:55:31.985177 env[1436]: time="2024-12-13T01:55:31.985144567Z" level=info msg="CreateContainer within sandbox \"a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 01:55:32.032322 env[1436]: time="2024-12-13T01:55:32.032256260Z" level=info msg="CreateContainer within sandbox \"a2fe916d3759857eec2465e4e03148cdf1c14507844a774a4d3e4dce41b5e9b1\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"a6dea8dfee0ca7fa305c3a46db3f0bf52fc15fa5d8afd06898ee14e8ea9886df\"" Dec 13 01:55:32.033012 env[1436]: time="2024-12-13T01:55:32.032979665Z" level=info msg="StartContainer for \"a6dea8dfee0ca7fa305c3a46db3f0bf52fc15fa5d8afd06898ee14e8ea9886df\"" Dec 13 01:55:32.048869 systemd[1]: Started cri-containerd-a6dea8dfee0ca7fa305c3a46db3f0bf52fc15fa5d8afd06898ee14e8ea9886df.scope. Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.061000 audit: BPF prog-id=125 op=LOAD Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3499 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:32.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136646561386466656530636137666133303563336134366462336630 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=3499 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:32.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136646561386466656530636137666133303563336134366462336630 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit: BPF prog-id=126 op=LOAD Dec 13 01:55:32.062000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000388370 items=0 ppid=3499 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:32.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136646561386466656530636137666133303563336134366462336630 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit: BPF prog-id=127 op=LOAD Dec 13 01:55:32.062000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003883b8 items=0 ppid=3499 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:32.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136646561386466656530636137666133303563336134366462336630 Dec 13 01:55:32.062000 audit: BPF prog-id=127 op=UNLOAD Dec 13 01:55:32.062000 audit: BPF prog-id=126 op=UNLOAD Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:32.062000 audit: BPF prog-id=128 op=LOAD Dec 13 01:55:32.062000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003887c8 items=0 ppid=3499 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:32.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136646561386466656530636137666133303563336134366462336630 Dec 13 01:55:32.084985 env[1436]: time="2024-12-13T01:55:32.084938086Z" level=info msg="StartContainer for \"a6dea8dfee0ca7fa305c3a46db3f0bf52fc15fa5d8afd06898ee14e8ea9886df\" returns successfully" Dec 13 01:55:32.118452 kubelet[1967]: E1213 01:55:32.118417 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:32.697622 systemd-networkd[1587]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 01:55:33.119054 kubelet[1967]: E1213 01:55:33.119000 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:34.119709 kubelet[1967]: E1213 01:55:34.119586 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:35.120469 kubelet[1967]: E1213 01:55:35.120371 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:36.121437 kubelet[1967]: E1213 01:55:36.121377 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:37.121994 kubelet[1967]: E1213 01:55:37.121936 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:38.123053 kubelet[1967]: E1213 01:55:38.122995 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:39.124193 kubelet[1967]: E1213 01:55:39.124151 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:40.125085 kubelet[1967]: E1213 01:55:40.125034 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"