Dec 13 14:34:43.013962 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:34:43.013986 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:34:43.013995 kernel: BIOS-provided physical RAM map: Dec 13 14:34:43.014001 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:34:43.014008 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Dec 13 14:34:43.014015 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Dec 13 14:34:43.014027 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Dec 13 14:34:43.014033 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Dec 13 14:34:43.014039 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Dec 13 14:34:43.014046 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Dec 13 14:34:43.014053 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Dec 13 14:34:43.014060 kernel: printk: bootconsole [earlyser0] enabled Dec 13 14:34:43.014068 kernel: NX (Execute Disable) protection: active Dec 13 14:34:43.014074 kernel: efi: EFI v2.70 by Microsoft Dec 13 14:34:43.014085 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Dec 13 14:34:43.014093 kernel: random: crng init done Dec 13 14:34:43.014101 kernel: SMBIOS 3.1.0 present. Dec 13 14:34:43.014109 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Dec 13 14:34:43.014115 kernel: Hypervisor detected: Microsoft Hyper-V Dec 13 14:34:43.014121 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Dec 13 14:34:43.014130 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Dec 13 14:34:43.014138 kernel: Hyper-V: Nested features: 0x1e0101 Dec 13 14:34:43.014148 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Dec 13 14:34:43.014154 kernel: Hyper-V: Using hypercall for remote TLB flush Dec 13 14:34:43.014161 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Dec 13 14:34:43.014170 kernel: tsc: Marking TSC unstable due to running on Hyper-V Dec 13 14:34:43.014179 kernel: tsc: Detected 2593.906 MHz processor Dec 13 14:34:43.014187 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:34:43.014193 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:34:43.014201 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Dec 13 14:34:43.014209 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:34:43.014217 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Dec 13 14:34:43.014227 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Dec 13 14:34:43.014233 kernel: Using GB pages for direct mapping Dec 13 14:34:43.016283 kernel: Secure boot disabled Dec 13 14:34:43.016301 kernel: ACPI: Early table checksum verification disabled Dec 13 14:34:43.016314 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Dec 13 14:34:43.016326 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:34:43.016338 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:34:43.016351 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Dec 13 14:34:43.016373 kernel: ACPI: FACS 0x000000003FFFE000 000040 Dec 13 14:34:43.016385 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:34:43.016398 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:34:43.016411 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:34:43.016423 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:34:43.016436 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:34:43.016452 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:34:43.016464 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:34:43.016477 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Dec 13 14:34:43.016490 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Dec 13 14:34:43.016502 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Dec 13 14:34:43.016515 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Dec 13 14:34:43.016528 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Dec 13 14:34:43.016540 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Dec 13 14:34:43.016556 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Dec 13 14:34:43.016568 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Dec 13 14:34:43.016581 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Dec 13 14:34:43.016593 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Dec 13 14:34:43.016606 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:34:43.016618 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:34:43.016631 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Dec 13 14:34:43.016645 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Dec 13 14:34:43.016658 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Dec 13 14:34:43.016673 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Dec 13 14:34:43.016686 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Dec 13 14:34:43.016699 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Dec 13 14:34:43.016712 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Dec 13 14:34:43.016724 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Dec 13 14:34:43.016737 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Dec 13 14:34:43.016750 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Dec 13 14:34:43.016763 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Dec 13 14:34:43.016776 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Dec 13 14:34:43.016791 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Dec 13 14:34:43.016804 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Dec 13 14:34:43.016816 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Dec 13 14:34:43.016829 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Dec 13 14:34:43.016842 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Dec 13 14:34:43.016855 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Dec 13 14:34:43.016868 kernel: Zone ranges: Dec 13 14:34:43.016881 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:34:43.016894 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:34:43.016909 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:34:43.016922 kernel: Movable zone start for each node Dec 13 14:34:43.016935 kernel: Early memory node ranges Dec 13 14:34:43.016947 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:34:43.016960 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Dec 13 14:34:43.016973 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Dec 13 14:34:43.016985 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:34:43.016998 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Dec 13 14:34:43.017011 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:34:43.017026 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:34:43.017038 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Dec 13 14:34:43.017051 kernel: ACPI: PM-Timer IO Port: 0x408 Dec 13 14:34:43.017064 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Dec 13 14:34:43.017077 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:34:43.017090 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:34:43.017102 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:34:43.017115 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Dec 13 14:34:43.017128 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:34:43.017143 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Dec 13 14:34:43.017156 kernel: Booting paravirtualized kernel on Hyper-V Dec 13 14:34:43.017169 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:34:43.017182 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:34:43.017195 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:34:43.017208 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:34:43.017221 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:34:43.017233 kernel: Hyper-V: PV spinlocks enabled Dec 13 14:34:43.017297 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:34:43.017313 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Dec 13 14:34:43.017326 kernel: Policy zone: Normal Dec 13 14:34:43.017341 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:34:43.017354 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:34:43.017367 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:34:43.017380 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:34:43.017392 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:34:43.017405 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 308056K reserved, 0K cma-reserved) Dec 13 14:34:43.017420 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:34:43.017434 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:34:43.017455 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:34:43.017470 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:34:43.017483 kernel: rcu: RCU event tracing is enabled. Dec 13 14:34:43.017497 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:34:43.017511 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:34:43.017524 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:34:43.017537 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:34:43.017550 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:34:43.017564 kernel: Using NULL legacy PIC Dec 13 14:34:43.017581 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Dec 13 14:34:43.017594 kernel: Console: colour dummy device 80x25 Dec 13 14:34:43.017607 kernel: printk: console [tty1] enabled Dec 13 14:34:43.017621 kernel: printk: console [ttyS0] enabled Dec 13 14:34:43.017634 kernel: printk: bootconsole [earlyser0] disabled Dec 13 14:34:43.017650 kernel: ACPI: Core revision 20210730 Dec 13 14:34:43.017664 kernel: Failed to register legacy timer interrupt Dec 13 14:34:43.017677 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:34:43.017690 kernel: Hyper-V: Using IPI hypercalls Dec 13 14:34:43.017705 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Dec 13 14:34:43.017718 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:34:43.017731 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:34:43.017744 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:34:43.017757 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:34:43.017770 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:34:43.017785 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:34:43.017799 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:34:43.017812 kernel: RETBleed: Vulnerable Dec 13 14:34:43.017825 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:34:43.017838 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:34:43.017852 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:34:43.017865 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:34:43.017878 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:34:43.017892 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:34:43.017905 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:34:43.017921 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:34:43.017934 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:34:43.017948 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:34:43.017962 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:34:43.017975 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 14:34:43.017988 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 14:34:43.018001 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 14:34:43.018015 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Dec 13 14:34:43.018029 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:34:43.018042 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:34:43.018055 kernel: LSM: Security Framework initializing Dec 13 14:34:43.018069 kernel: SELinux: Initializing. Dec 13 14:34:43.018085 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:34:43.018098 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:34:43.018112 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:34:43.018125 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:34:43.018139 kernel: signal: max sigframe size: 3632 Dec 13 14:34:43.018153 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:34:43.018166 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:34:43.018179 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:34:43.018193 kernel: x86: Booting SMP configuration: Dec 13 14:34:43.018206 kernel: .... node #0, CPUs: #1 Dec 13 14:34:43.018223 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Dec 13 14:34:43.018245 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:34:43.018260 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:34:43.018273 kernel: smpboot: Max logical packages: 1 Dec 13 14:34:43.018286 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Dec 13 14:34:43.018300 kernel: devtmpfs: initialized Dec 13 14:34:43.018314 kernel: x86/mm: Memory block size: 128MB Dec 13 14:34:43.018328 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Dec 13 14:34:43.018344 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:34:43.018357 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:34:43.018371 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:34:43.018385 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:34:43.018398 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:34:43.018412 kernel: audit: type=2000 audit(1734100482.023:1): state=initialized audit_enabled=0 res=1 Dec 13 14:34:43.018425 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:34:43.018438 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:34:43.018452 kernel: cpuidle: using governor menu Dec 13 14:34:43.018468 kernel: ACPI: bus type PCI registered Dec 13 14:34:43.018483 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:34:43.018496 kernel: dca service started, version 1.12.1 Dec 13 14:34:43.018510 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:34:43.018524 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:34:43.018537 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:34:43.018551 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:34:43.018564 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:34:43.018577 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:34:43.018593 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:34:43.018607 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:34:43.018620 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:34:43.018634 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:34:43.018648 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:34:43.018661 kernel: ACPI: Interpreter enabled Dec 13 14:34:43.018675 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:34:43.018688 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:34:43.018702 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:34:43.018718 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Dec 13 14:34:43.018731 kernel: iommu: Default domain type: Translated Dec 13 14:34:43.018745 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:34:43.018759 kernel: vgaarb: loaded Dec 13 14:34:43.018772 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:34:43.018786 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:34:43.018799 kernel: PTP clock support registered Dec 13 14:34:43.018813 kernel: Registered efivars operations Dec 13 14:34:43.018827 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:34:43.018840 kernel: PCI: System does not support PCI Dec 13 14:34:43.018856 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Dec 13 14:34:43.018869 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:34:43.018882 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:34:43.018896 kernel: pnp: PnP ACPI init Dec 13 14:34:43.018910 kernel: pnp: PnP ACPI: found 3 devices Dec 13 14:34:43.018923 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:34:43.018937 kernel: NET: Registered PF_INET protocol family Dec 13 14:34:43.018950 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:34:43.018966 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:34:43.018980 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:34:43.018994 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:34:43.019007 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:34:43.019021 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:34:43.019034 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:34:43.019048 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:34:43.019062 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:34:43.019075 kernel: NET: Registered PF_XDP protocol family Dec 13 14:34:43.019091 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:34:43.019105 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:34:43.019119 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Dec 13 14:34:43.019132 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:34:43.019146 kernel: Initialise system trusted keyrings Dec 13 14:34:43.019159 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:34:43.019172 kernel: Key type asymmetric registered Dec 13 14:34:43.019186 kernel: Asymmetric key parser 'x509' registered Dec 13 14:34:43.019199 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:34:43.019215 kernel: io scheduler mq-deadline registered Dec 13 14:34:43.019228 kernel: io scheduler kyber registered Dec 13 14:34:43.019254 kernel: io scheduler bfq registered Dec 13 14:34:43.019266 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:34:43.019280 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:34:43.019294 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:34:43.019307 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:34:43.019321 kernel: i8042: PNP: No PS/2 controller found. Dec 13 14:34:43.019482 kernel: rtc_cmos 00:02: registered as rtc0 Dec 13 14:34:43.019600 kernel: rtc_cmos 00:02: setting system clock to 2024-12-13T14:34:42 UTC (1734100482) Dec 13 14:34:43.019705 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Dec 13 14:34:43.019723 kernel: fail to initialize ptp_kvm Dec 13 14:34:43.019736 kernel: intel_pstate: CPU model not supported Dec 13 14:34:43.019750 kernel: efifb: probing for efifb Dec 13 14:34:43.019763 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:34:43.019777 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:34:43.019790 kernel: efifb: scrolling: redraw Dec 13 14:34:43.019807 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:34:43.019821 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:34:43.019834 kernel: fb0: EFI VGA frame buffer device Dec 13 14:34:43.019848 kernel: pstore: Registered efi as persistent store backend Dec 13 14:34:43.019862 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:34:43.019875 kernel: Segment Routing with IPv6 Dec 13 14:34:43.019889 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:34:43.019901 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:34:43.019915 kernel: Key type dns_resolver registered Dec 13 14:34:43.019931 kernel: IPI shorthand broadcast: enabled Dec 13 14:34:43.019945 kernel: sched_clock: Marking stable (753317100, 20224500)->(958555200, -185013600) Dec 13 14:34:43.019958 kernel: registered taskstats version 1 Dec 13 14:34:43.019972 kernel: Loading compiled-in X.509 certificates Dec 13 14:34:43.019985 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:34:43.019999 kernel: Key type .fscrypt registered Dec 13 14:34:43.020012 kernel: Key type fscrypt-provisioning registered Dec 13 14:34:43.020025 kernel: pstore: Using crash dump compression: deflate Dec 13 14:34:43.020041 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:34:43.020055 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:34:43.020069 kernel: ima: No architecture policies found Dec 13 14:34:43.020082 kernel: clk: Disabling unused clocks Dec 13 14:34:43.020096 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:34:43.020109 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:34:43.020123 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:34:43.020137 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:34:43.020150 kernel: Run /init as init process Dec 13 14:34:43.020164 kernel: with arguments: Dec 13 14:34:43.020180 kernel: /init Dec 13 14:34:43.020194 kernel: with environment: Dec 13 14:34:43.020207 kernel: HOME=/ Dec 13 14:34:43.020220 kernel: TERM=linux Dec 13 14:34:43.020234 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:34:43.030272 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:34:43.030286 systemd[1]: Detected virtualization microsoft. Dec 13 14:34:43.030300 systemd[1]: Detected architecture x86-64. Dec 13 14:34:43.030310 systemd[1]: Running in initrd. Dec 13 14:34:43.030317 systemd[1]: No hostname configured, using default hostname. Dec 13 14:34:43.030325 systemd[1]: Hostname set to . Dec 13 14:34:43.030336 systemd[1]: Initializing machine ID from random generator. Dec 13 14:34:43.030346 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:34:43.030355 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:34:43.030362 systemd[1]: Reached target cryptsetup.target. Dec 13 14:34:43.030373 systemd[1]: Reached target paths.target. Dec 13 14:34:43.030384 systemd[1]: Reached target slices.target. Dec 13 14:34:43.030393 systemd[1]: Reached target swap.target. Dec 13 14:34:43.030401 systemd[1]: Reached target timers.target. Dec 13 14:34:43.030409 systemd[1]: Listening on iscsid.socket. Dec 13 14:34:43.030419 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:34:43.030428 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:34:43.030438 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:34:43.030447 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:34:43.030458 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:34:43.030468 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:34:43.030476 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:34:43.030484 systemd[1]: Reached target sockets.target. Dec 13 14:34:43.030495 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:34:43.030504 systemd[1]: Finished network-cleanup.service. Dec 13 14:34:43.030513 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:34:43.030520 systemd[1]: Starting systemd-journald.service... Dec 13 14:34:43.030532 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:34:43.030541 systemd[1]: Starting systemd-resolved.service... Dec 13 14:34:43.030551 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:34:43.030559 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:34:43.030566 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:34:43.030577 kernel: audit: type=1130 audit(1734100483.023:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.030590 systemd-journald[183]: Journal started Dec 13 14:34:43.030645 systemd-journald[183]: Runtime Journal (/run/log/journal/cef177deec2f48f8b021fdff416b6b13) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:34:43.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.994626 systemd-modules-load[184]: Inserted module 'overlay' Dec 13 14:34:43.046930 systemd[1]: Started systemd-journald.service. Dec 13 14:34:43.047661 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:34:43.052742 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:34:43.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.065983 kernel: audit: type=1130 audit(1734100483.047:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.067294 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:34:43.089392 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:34:43.089438 kernel: audit: type=1130 audit(1734100483.051:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.102922 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:34:43.122525 kernel: Bridge firewalling registered Dec 13 14:34:43.122580 kernel: audit: type=1130 audit(1734100483.107:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.123004 systemd-modules-load[184]: Inserted module 'br_netfilter' Dec 13 14:34:43.129061 systemd-resolved[185]: Positive Trust Anchors: Dec 13 14:34:43.129071 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:34:43.129119 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:34:43.132833 systemd-resolved[185]: Defaulting to hostname 'linux'. Dec 13 14:34:43.133882 systemd[1]: Started systemd-resolved.service. Dec 13 14:34:43.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.160852 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:34:43.196377 kernel: audit: type=1130 audit(1734100483.160:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.196410 kernel: SCSI subsystem initialized Dec 13 14:34:43.196427 kernel: audit: type=1130 audit(1734100483.176:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.177065 systemd[1]: Reached target nss-lookup.target. Dec 13 14:34:43.189180 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:34:43.201284 dracut-cmdline[200]: dracut-dracut-053 Dec 13 14:34:43.203831 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:34:43.237636 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:34:43.237682 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:34:43.242724 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:34:43.246708 systemd-modules-load[184]: Inserted module 'dm_multipath' Dec 13 14:34:43.247593 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:34:43.271341 kernel: audit: type=1130 audit(1734100483.253:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.254662 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:34:43.277616 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:34:43.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.294259 kernel: audit: type=1130 audit(1734100483.279:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.302261 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:34:43.321264 kernel: iscsi: registered transport (tcp) Dec 13 14:34:43.348259 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:34:43.348339 kernel: QLogic iSCSI HBA Driver Dec 13 14:34:43.377507 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:34:43.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.382513 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:34:43.397641 kernel: audit: type=1130 audit(1734100483.381:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.441268 kernel: raid6: avx512x4 gen() 18404 MB/s Dec 13 14:34:43.461255 kernel: raid6: avx512x4 xor() 7647 MB/s Dec 13 14:34:43.481251 kernel: raid6: avx512x2 gen() 18426 MB/s Dec 13 14:34:43.501254 kernel: raid6: avx512x2 xor() 30060 MB/s Dec 13 14:34:43.520250 kernel: raid6: avx512x1 gen() 18468 MB/s Dec 13 14:34:43.539250 kernel: raid6: avx512x1 xor() 26943 MB/s Dec 13 14:34:43.560255 kernel: raid6: avx2x4 gen() 18386 MB/s Dec 13 14:34:43.580249 kernel: raid6: avx2x4 xor() 7929 MB/s Dec 13 14:34:43.600248 kernel: raid6: avx2x2 gen() 18367 MB/s Dec 13 14:34:43.620251 kernel: raid6: avx2x2 xor() 22255 MB/s Dec 13 14:34:43.639249 kernel: raid6: avx2x1 gen() 14145 MB/s Dec 13 14:34:43.659249 kernel: raid6: avx2x1 xor() 19510 MB/s Dec 13 14:34:43.679250 kernel: raid6: sse2x4 gen() 11730 MB/s Dec 13 14:34:43.698249 kernel: raid6: sse2x4 xor() 7283 MB/s Dec 13 14:34:43.718248 kernel: raid6: sse2x2 gen() 12880 MB/s Dec 13 14:34:43.738250 kernel: raid6: sse2x2 xor() 7498 MB/s Dec 13 14:34:43.758248 kernel: raid6: sse2x1 gen() 11623 MB/s Dec 13 14:34:43.781466 kernel: raid6: sse2x1 xor() 5906 MB/s Dec 13 14:34:43.781490 kernel: raid6: using algorithm avx512x1 gen() 18468 MB/s Dec 13 14:34:43.781502 kernel: raid6: .... xor() 26943 MB/s, rmw enabled Dec 13 14:34:43.785073 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:34:43.804259 kernel: xor: automatically using best checksumming function avx Dec 13 14:34:43.900267 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:34:43.908527 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:34:43.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.912000 audit: BPF prog-id=7 op=LOAD Dec 13 14:34:43.912000 audit: BPF prog-id=8 op=LOAD Dec 13 14:34:43.913048 systemd[1]: Starting systemd-udevd.service... Dec 13 14:34:43.928213 systemd-udevd[383]: Using default interface naming scheme 'v252'. Dec 13 14:34:43.935039 systemd[1]: Started systemd-udevd.service. Dec 13 14:34:43.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.941018 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:34:43.958038 dracut-pre-trigger[387]: rd.md=0: removing MD RAID activation Dec 13 14:34:43.988758 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:34:43.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:43.992232 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:34:44.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:44.030296 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:34:44.067259 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:34:44.084259 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:34:44.088260 kernel: AES CTR mode by8 optimization enabled Dec 13 14:34:44.113293 kernel: hv_vmbus: Vmbus version:5.2 Dec 13 14:34:44.134786 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:34:44.134845 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:34:44.141547 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:34:44.152541 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Dec 13 14:34:44.152585 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:34:44.167256 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Dec 13 14:34:44.173266 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:34:44.181374 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:34:44.195440 kernel: scsi host0: storvsc_host_t Dec 13 14:34:44.195626 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:34:44.200912 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:34:44.200962 kernel: scsi host1: storvsc_host_t Dec 13 14:34:44.227623 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:34:44.239718 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:34:44.239752 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:34:44.258097 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:34:44.258303 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:34:44.258476 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:34:44.258631 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:34:44.258790 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:34:44.258957 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:34:44.258976 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:34:44.373358 kernel: hv_netvsc 7c1e5288-52ec-7c1e-5288-52ec7c1e5288 eth0: VF slot 1 added Dec 13 14:34:44.382256 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:34:44.388261 kernel: hv_pci 93a7bf6d-1bae-48f0-a7b6-e7b14ad6889a: PCI VMBus probing: Using version 0x10004 Dec 13 14:34:44.461374 kernel: hv_pci 93a7bf6d-1bae-48f0-a7b6-e7b14ad6889a: PCI host bridge to bus 1bae:00 Dec 13 14:34:44.461559 kernel: pci_bus 1bae:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Dec 13 14:34:44.461721 kernel: pci_bus 1bae:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:34:44.461862 kernel: pci 1bae:00:02.0: [15b3:1016] type 00 class 0x020000 Dec 13 14:34:44.462029 kernel: pci 1bae:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:34:44.462185 kernel: pci 1bae:00:02.0: enabling Extended Tags Dec 13 14:34:44.462355 kernel: pci 1bae:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 1bae:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Dec 13 14:34:44.462514 kernel: pci_bus 1bae:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:34:44.462660 kernel: pci 1bae:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:34:44.554266 kernel: mlx5_core 1bae:00:02.0: firmware version: 14.30.5000 Dec 13 14:34:44.812954 kernel: mlx5_core 1bae:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 14:34:44.813142 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (432) Dec 13 14:34:44.813161 kernel: mlx5_core 1bae:00:02.0: Supported tc offload range - chains: 1, prios: 1 Dec 13 14:34:44.813328 kernel: mlx5_core 1bae:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing Dec 13 14:34:44.813493 kernel: hv_netvsc 7c1e5288-52ec-7c1e-5288-52ec7c1e5288 eth0: VF registering: eth1 Dec 13 14:34:44.813643 kernel: mlx5_core 1bae:00:02.0 eth1: joined to eth0 Dec 13 14:34:44.699490 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:34:44.759855 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:34:44.823262 kernel: mlx5_core 1bae:00:02.0 enP7086s1: renamed from eth1 Dec 13 14:34:44.875361 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:34:44.927788 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:34:44.930581 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:34:44.936608 systemd[1]: Starting disk-uuid.service... Dec 13 14:34:44.952259 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:34:44.961256 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:34:45.973588 disk-uuid[555]: The operation has completed successfully. Dec 13 14:34:45.976331 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:34:46.039138 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:34:46.039253 systemd[1]: Finished disk-uuid.service. Dec 13 14:34:46.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.057669 systemd[1]: Starting verity-setup.service... Dec 13 14:34:46.091266 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:34:46.297519 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:34:46.301471 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:34:46.307307 systemd[1]: Finished verity-setup.service. Dec 13 14:34:46.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.377273 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:34:46.377466 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:34:46.381308 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:34:46.385414 systemd[1]: Starting ignition-setup.service... Dec 13 14:34:46.390489 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:34:46.407153 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:34:46.407193 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:34:46.407204 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:34:46.456356 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:34:46.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.460000 audit: BPF prog-id=9 op=LOAD Dec 13 14:34:46.461390 systemd[1]: Starting systemd-networkd.service... Dec 13 14:34:46.486616 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:34:46.488257 systemd-networkd[796]: lo: Link UP Dec 13 14:34:46.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.488262 systemd-networkd[796]: lo: Gained carrier Dec 13 14:34:46.488743 systemd-networkd[796]: Enumeration completed Dec 13 14:34:46.489267 systemd[1]: Started systemd-networkd.service. Dec 13 14:34:46.490105 systemd-networkd[796]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:34:46.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.492320 systemd[1]: Reached target network.target. Dec 13 14:34:46.512864 iscsid[805]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:34:46.512864 iscsid[805]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:34:46.512864 iscsid[805]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:34:46.512864 iscsid[805]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:34:46.512864 iscsid[805]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:34:46.512864 iscsid[805]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:34:46.512864 iscsid[805]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:34:46.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.496649 systemd[1]: Starting iscsiuio.service... Dec 13 14:34:46.504870 systemd[1]: Started iscsiuio.service. Dec 13 14:34:46.508718 systemd[1]: Starting iscsid.service... Dec 13 14:34:46.517801 systemd[1]: Started iscsid.service. Dec 13 14:34:46.558748 kernel: mlx5_core 1bae:00:02.0 enP7086s1: Link up Dec 13 14:34:46.528349 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:34:46.560359 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:34:46.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.563194 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:34:46.567108 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:34:46.579458 systemd[1]: Reached target remote-fs.target. Dec 13 14:34:46.582284 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:34:46.592216 kernel: hv_netvsc 7c1e5288-52ec-7c1e-5288-52ec7c1e5288 eth0: Data path switched to VF: enP7086s1 Dec 13 14:34:46.601713 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:46.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.599155 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:34:46.599265 systemd-networkd[796]: enP7086s1: Link UP Dec 13 14:34:46.599499 systemd-networkd[796]: eth0: Link UP Dec 13 14:34:46.599926 systemd-networkd[796]: eth0: Gained carrier Dec 13 14:34:46.608762 systemd-networkd[796]: enP7086s1: Gained carrier Dec 13 14:34:46.620312 systemd-networkd[796]: eth0: DHCPv4 address 10.200.8.10/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:34:46.621088 systemd[1]: Finished ignition-setup.service. Dec 13 14:34:46.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.628971 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:34:47.974449 systemd-networkd[796]: eth0: Gained IPv6LL Dec 13 14:34:50.226703 ignition[820]: Ignition 2.14.0 Dec 13 14:34:50.226718 ignition[820]: Stage: fetch-offline Dec 13 14:34:50.226800 ignition[820]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:50.226854 ignition[820]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:34:50.335068 ignition[820]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:34:50.335302 ignition[820]: parsed url from cmdline: "" Dec 13 14:34:50.336584 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:34:50.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.335309 ignition[820]: no config URL provided Dec 13 14:34:50.363281 kernel: kauditd_printk_skb: 17 callbacks suppressed Dec 13 14:34:50.363313 kernel: audit: type=1130 audit(1734100490.340:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.341501 systemd[1]: Starting ignition-fetch.service... Dec 13 14:34:50.335316 ignition[820]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:34:50.335326 ignition[820]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:34:50.335331 ignition[820]: failed to fetch config: resource requires networking Dec 13 14:34:50.335671 ignition[820]: Ignition finished successfully Dec 13 14:34:50.355514 ignition[826]: Ignition 2.14.0 Dec 13 14:34:50.355520 ignition[826]: Stage: fetch Dec 13 14:34:50.355623 ignition[826]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:50.355648 ignition[826]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:34:50.362151 ignition[826]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:34:50.362391 ignition[826]: parsed url from cmdline: "" Dec 13 14:34:50.362396 ignition[826]: no config URL provided Dec 13 14:34:50.362403 ignition[826]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:34:50.362414 ignition[826]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:34:50.362453 ignition[826]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:34:50.442973 ignition[826]: GET result: OK Dec 13 14:34:50.443065 ignition[826]: config has been read from IMDS userdata Dec 13 14:34:50.443089 ignition[826]: parsing config with SHA512: e3e3a7a3d73dd67a9b8821c98afb9cf48b09d9d9cb78f3c3e0dcd15fd0f455170bb536633989a5f7c8593929bd527ce6bc0948df60610b790badb4d65565b972 Dec 13 14:34:50.446373 unknown[826]: fetched base config from "system" Dec 13 14:34:50.446862 ignition[826]: fetch: fetch complete Dec 13 14:34:50.446384 unknown[826]: fetched base config from "system" Dec 13 14:34:50.446868 ignition[826]: fetch: fetch passed Dec 13 14:34:50.446390 unknown[826]: fetched user config from "azure" Dec 13 14:34:50.446911 ignition[826]: Ignition finished successfully Dec 13 14:34:50.448652 systemd[1]: Finished ignition-fetch.service. Dec 13 14:34:50.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.462921 systemd[1]: Starting ignition-kargs.service... Dec 13 14:34:50.480445 kernel: audit: type=1130 audit(1734100490.461:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.484748 ignition[832]: Ignition 2.14.0 Dec 13 14:34:50.484757 ignition[832]: Stage: kargs Dec 13 14:34:50.484884 ignition[832]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:50.484917 ignition[832]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:34:50.491741 systemd[1]: Finished ignition-kargs.service. Dec 13 14:34:50.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.488187 ignition[832]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:34:50.510326 kernel: audit: type=1130 audit(1734100490.493:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.494673 systemd[1]: Starting ignition-disks.service... Dec 13 14:34:50.489981 ignition[832]: kargs: kargs passed Dec 13 14:34:50.490050 ignition[832]: Ignition finished successfully Dec 13 14:34:50.515546 ignition[838]: Ignition 2.14.0 Dec 13 14:34:50.515552 ignition[838]: Stage: disks Dec 13 14:34:50.515660 ignition[838]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:50.515684 ignition[838]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:34:50.523377 systemd[1]: Finished ignition-disks.service. Dec 13 14:34:50.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.521209 ignition[838]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:34:50.544417 kernel: audit: type=1130 audit(1734100490.525:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.525589 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:34:50.522557 ignition[838]: disks: disks passed Dec 13 14:34:50.539802 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:34:50.522596 ignition[838]: Ignition finished successfully Dec 13 14:34:50.544501 systemd[1]: Reached target local-fs.target. Dec 13 14:34:50.548375 systemd[1]: Reached target sysinit.target. Dec 13 14:34:50.550426 systemd[1]: Reached target basic.target. Dec 13 14:34:50.553839 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:34:50.636793 systemd-fsck[846]: ROOT: clean, 621/7326000 files, 481077/7359488 blocks Dec 13 14:34:50.640461 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:34:50.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.645342 systemd[1]: Mounting sysroot.mount... Dec 13 14:34:50.660285 kernel: audit: type=1130 audit(1734100490.644:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:50.670255 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:34:50.672543 systemd[1]: Mounted sysroot.mount. Dec 13 14:34:50.676292 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:34:50.707803 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:34:50.713867 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:34:50.719033 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:34:50.719073 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:34:50.728450 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:34:50.773753 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:34:50.779631 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:34:50.802880 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (857) Dec 13 14:34:50.802920 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:34:50.802934 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:34:50.803052 initrd-setup-root[862]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:34:50.813101 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:34:50.815692 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:34:50.822078 initrd-setup-root[888]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:34:50.838853 initrd-setup-root[896]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:34:50.845280 initrd-setup-root[904]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:34:51.343737 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:34:51.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:51.349200 systemd[1]: Starting ignition-mount.service... Dec 13 14:34:51.360257 kernel: audit: type=1130 audit(1734100491.348:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:51.364428 systemd[1]: Starting sysroot-boot.service... Dec 13 14:34:51.367052 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:34:51.367149 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:34:51.387700 ignition[923]: INFO : Ignition 2.14.0 Dec 13 14:34:51.390235 ignition[923]: INFO : Stage: mount Dec 13 14:34:51.392260 ignition[923]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:51.392260 ignition[923]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:34:51.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:51.398630 systemd[1]: Finished sysroot-boot.service. Dec 13 14:34:51.418872 kernel: audit: type=1130 audit(1734100491.402:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:51.407981 systemd[1]: Finished ignition-mount.service. Dec 13 14:34:51.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:51.430320 ignition[923]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:34:51.430320 ignition[923]: INFO : mount: mount passed Dec 13 14:34:51.430320 ignition[923]: INFO : Ignition finished successfully Dec 13 14:34:51.437917 kernel: audit: type=1130 audit(1734100491.418:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:52.130671 coreos-metadata[856]: Dec 13 14:34:52.130 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:34:52.147469 coreos-metadata[856]: Dec 13 14:34:52.147 INFO Fetch successful Dec 13 14:34:52.180558 coreos-metadata[856]: Dec 13 14:34:52.180 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:34:52.197933 coreos-metadata[856]: Dec 13 14:34:52.197 INFO Fetch successful Dec 13 14:34:52.219748 coreos-metadata[856]: Dec 13 14:34:52.219 INFO wrote hostname ci-3510.3.6-a-f5c8c23acc to /sysroot/etc/hostname Dec 13 14:34:52.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:52.221921 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:34:52.244543 kernel: audit: type=1130 audit(1734100492.226:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:52.228382 systemd[1]: Starting ignition-files.service... Dec 13 14:34:52.247805 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:34:52.264267 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (936) Dec 13 14:34:52.264299 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:34:52.272110 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:34:52.272133 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:34:52.282096 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:34:52.294704 ignition[955]: INFO : Ignition 2.14.0 Dec 13 14:34:52.294704 ignition[955]: INFO : Stage: files Dec 13 14:34:52.298879 ignition[955]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:52.298879 ignition[955]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:34:52.298879 ignition[955]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:34:52.315006 ignition[955]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:34:52.318408 ignition[955]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:34:52.318408 ignition[955]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:34:52.344073 ignition[955]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:34:52.347723 ignition[955]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:34:52.357433 unknown[955]: wrote ssh authorized keys file for user: core Dec 13 14:34:52.359856 ignition[955]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:34:52.388573 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:34:52.393733 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:34:52.400319 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:34:52.404493 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:34:52.408729 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:34:52.414925 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:34:52.420933 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:34:52.425521 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:34:52.432861 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3918295239" Dec 13 14:34:52.444265 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (960) Dec 13 14:34:52.445276 ignition[955]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3918295239": device or resource busy Dec 13 14:34:52.445276 ignition[955]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3918295239", trying btrfs: device or resource busy Dec 13 14:34:52.445276 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3918295239" Dec 13 14:34:52.445276 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3918295239" Dec 13 14:34:52.445276 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3918295239" Dec 13 14:34:52.445276 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3918295239" Dec 13 14:34:52.445276 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:34:52.445276 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:34:52.445276 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:34:52.489142 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem491387907" Dec 13 14:34:52.489142 ignition[955]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem491387907": device or resource busy Dec 13 14:34:52.489142 ignition[955]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem491387907", trying btrfs: device or resource busy Dec 13 14:34:52.489142 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem491387907" Dec 13 14:34:52.489142 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem491387907" Dec 13 14:34:52.489142 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem491387907" Dec 13 14:34:52.489142 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem491387907" Dec 13 14:34:52.489142 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:34:52.489142 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:34:52.489142 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:34:52.448509 systemd[1]: mnt-oem3918295239.mount: Deactivated successfully. Dec 13 14:34:52.473326 systemd[1]: mnt-oem491387907.mount: Deactivated successfully. Dec 13 14:34:53.033462 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 14:34:53.435334 ignition[955]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:34:53.435334 ignition[955]: INFO : files: op(f): [started] processing unit "waagent.service" Dec 13 14:34:53.435334 ignition[955]: INFO : files: op(f): [finished] processing unit "waagent.service" Dec 13 14:34:53.435334 ignition[955]: INFO : files: op(10): [started] processing unit "nvidia.service" Dec 13 14:34:53.435334 ignition[955]: INFO : files: op(10): [finished] processing unit "nvidia.service" Dec 13 14:34:53.470579 kernel: audit: type=1130 audit(1734100493.443:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.439077 systemd[1]: Finished ignition-files.service. Dec 13 14:34:53.474683 ignition[955]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Dec 13 14:34:53.474683 ignition[955]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Dec 13 14:34:53.474683 ignition[955]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Dec 13 14:34:53.474683 ignition[955]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:34:53.474683 ignition[955]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:34:53.474683 ignition[955]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:34:53.474683 ignition[955]: INFO : files: files passed Dec 13 14:34:53.474683 ignition[955]: INFO : Ignition finished successfully Dec 13 14:34:53.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.456040 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:34:53.463592 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:34:53.523552 initrd-setup-root-after-ignition[980]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:34:53.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.464323 systemd[1]: Starting ignition-quench.service... Dec 13 14:34:53.470788 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:34:53.470881 systemd[1]: Finished ignition-quench.service. Dec 13 14:34:53.491844 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:34:53.502474 systemd[1]: Reached target ignition-complete.target. Dec 13 14:34:53.509734 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:34:53.525651 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:34:53.525749 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:34:53.529392 systemd[1]: Reached target initrd-fs.target. Dec 13 14:34:53.533491 systemd[1]: Reached target initrd.target. Dec 13 14:34:53.535412 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:34:53.536129 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:34:53.567415 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:34:53.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.572099 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:34:53.581642 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:34:53.586142 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:34:53.590812 systemd[1]: Stopped target timers.target. Dec 13 14:34:53.594669 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:34:53.594794 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:34:53.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.607451 systemd[1]: Stopped target initrd.target. Dec 13 14:34:53.610987 systemd[1]: Stopped target basic.target. Dec 13 14:34:53.614831 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:34:53.618705 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:34:53.623100 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:34:53.627321 systemd[1]: Stopped target remote-fs.target. Dec 13 14:34:53.629536 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:34:53.633686 systemd[1]: Stopped target sysinit.target. Dec 13 14:34:53.637498 systemd[1]: Stopped target local-fs.target. Dec 13 14:34:53.641363 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:34:53.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.643469 systemd[1]: Stopped target swap.target. Dec 13 14:34:53.647091 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:34:53.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.647235 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:34:53.651092 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:34:53.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.654817 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:34:53.654982 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:34:53.685921 iscsid[805]: iscsid shutting down. Dec 13 14:34:53.658747 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:34:53.691627 ignition[993]: INFO : Ignition 2.14.0 Dec 13 14:34:53.691627 ignition[993]: INFO : Stage: umount Dec 13 14:34:53.691627 ignition[993]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:53.691627 ignition[993]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:34:53.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.658881 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:34:53.663677 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:34:53.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.663821 systemd[1]: Stopped ignition-files.service. Dec 13 14:34:53.667652 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:34:53.667777 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:34:53.672654 systemd[1]: Stopping ignition-mount.service... Dec 13 14:34:53.684155 systemd[1]: Stopping iscsid.service... Dec 13 14:34:53.692158 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:34:53.693973 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:34:53.694142 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:34:53.732326 ignition[993]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:34:53.732326 ignition[993]: INFO : umount: umount passed Dec 13 14:34:53.732326 ignition[993]: INFO : Ignition finished successfully Dec 13 14:34:53.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.698236 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:34:53.709804 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:34:53.738231 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:34:53.738861 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:34:53.738945 systemd[1]: Stopped iscsid.service. Dec 13 14:34:53.741110 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:34:53.741197 systemd[1]: Stopped ignition-mount.service. Dec 13 14:34:53.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.759347 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:34:53.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.759474 systemd[1]: Stopped ignition-disks.service. Dec 13 14:34:53.763964 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:34:53.764014 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:34:53.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.771961 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:34:53.772012 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:34:53.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.778043 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:34:53.778093 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:34:53.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.781873 systemd[1]: Stopped target paths.target. Dec 13 14:34:53.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.782253 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:34:53.784273 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:34:53.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.788559 systemd[1]: Stopped target slices.target. Dec 13 14:34:53.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.790314 systemd[1]: Stopped target sockets.target. Dec 13 14:34:53.792163 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:34:53.792204 systemd[1]: Closed iscsid.socket. Dec 13 14:34:53.793785 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:34:53.793825 systemd[1]: Stopped ignition-setup.service. Dec 13 14:34:53.797970 systemd[1]: Stopping iscsiuio.service... Dec 13 14:34:53.802134 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:34:53.802224 systemd[1]: Stopped iscsiuio.service. Dec 13 14:34:53.805986 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:34:53.806070 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:34:53.810620 systemd[1]: Stopped target network.target. Dec 13 14:34:53.813476 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:34:53.813504 systemd[1]: Closed iscsiuio.socket. Dec 13 14:34:53.815290 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:34:53.821188 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:34:53.821296 systemd-networkd[796]: eth0: DHCPv6 lease lost Dec 13 14:34:53.838937 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:34:53.842312 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:34:53.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.857036 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:34:53.857150 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:34:53.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.863000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:34:53.863000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:34:53.863995 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:34:53.864047 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:34:53.869395 systemd[1]: Stopping network-cleanup.service... Dec 13 14:34:53.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.872234 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:34:53.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.872369 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:34:53.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.876432 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:34:53.876486 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:34:53.881415 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:34:53.881466 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:34:53.885714 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:34:53.888648 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:34:53.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.899547 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:34:53.899696 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:34:53.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.907071 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:34:53.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.907117 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:34:53.907218 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:34:53.907312 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:34:53.946332 kernel: hv_netvsc 7c1e5288-52ec-7c1e-5288-52ec7c1e5288 eth0: Data path switched from VF: enP7086s1 Dec 13 14:34:53.907639 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:34:53.907673 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:34:53.908074 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:34:53.908104 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:34:53.908481 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:34:53.908512 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:34:53.909586 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:34:53.909745 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:34:53.909794 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:34:53.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.920528 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:34:53.920571 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:34:53.924304 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:34:53.924356 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:34:53.927468 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:34:53.927877 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:34:53.927952 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:34:53.965696 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:34:53.965788 systemd[1]: Stopped network-cleanup.service. Dec 13 14:34:54.075015 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:34:54.075151 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:34:54.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:54.081427 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:34:54.086053 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:34:54.086125 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:34:54.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:54.093448 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:34:54.107665 systemd[1]: Switching root. Dec 13 14:34:54.130890 systemd-journald[183]: Journal stopped Dec 13 14:35:09.015416 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Dec 13 14:35:09.015444 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:35:09.015458 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:35:09.015468 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:35:09.015478 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:35:09.015490 kernel: SELinux: policy capability open_perms=1 Dec 13 14:35:09.015504 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:35:09.015516 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:35:09.015529 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:35:09.015541 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:35:09.015552 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:35:09.015566 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:35:09.015575 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 14:35:09.015587 kernel: audit: type=1403 audit(1734100496.526:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:35:09.015602 systemd[1]: Successfully loaded SELinux policy in 291.522ms. Dec 13 14:35:09.015615 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.349ms. Dec 13 14:35:09.015627 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:35:09.015639 systemd[1]: Detected virtualization microsoft. Dec 13 14:35:09.015651 systemd[1]: Detected architecture x86-64. Dec 13 14:35:09.015662 systemd[1]: Detected first boot. Dec 13 14:35:09.015674 systemd[1]: Hostname set to . Dec 13 14:35:09.015687 systemd[1]: Initializing machine ID from random generator. Dec 13 14:35:09.015699 kernel: audit: type=1400 audit(1734100497.238:82): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:35:09.015710 kernel: audit: type=1400 audit(1734100497.253:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:35:09.015723 kernel: audit: type=1400 audit(1734100497.253:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:35:09.015737 kernel: audit: type=1334 audit(1734100497.276:85): prog-id=10 op=LOAD Dec 13 14:35:09.015750 kernel: audit: type=1334 audit(1734100497.276:86): prog-id=10 op=UNLOAD Dec 13 14:35:09.015760 kernel: audit: type=1334 audit(1734100497.281:87): prog-id=11 op=LOAD Dec 13 14:35:09.015770 kernel: audit: type=1334 audit(1734100497.281:88): prog-id=11 op=UNLOAD Dec 13 14:35:09.015781 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:35:09.015794 kernel: audit: type=1400 audit(1734100498.927:89): avc: denied { associate } for pid=1028 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:35:09.015806 kernel: audit: type=1300 audit(1734100498.927:89): arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1011 pid=1028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.015824 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:35:09.015838 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:35:09.015853 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:35:09.015869 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:35:09.015883 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:35:09.015898 kernel: audit: type=1334 audit(1734100508.508:91): prog-id=12 op=LOAD Dec 13 14:35:09.015913 kernel: audit: type=1334 audit(1734100508.508:92): prog-id=3 op=UNLOAD Dec 13 14:35:09.015931 kernel: audit: type=1334 audit(1734100508.512:93): prog-id=13 op=LOAD Dec 13 14:35:09.015949 kernel: audit: type=1334 audit(1734100508.516:94): prog-id=14 op=LOAD Dec 13 14:35:09.015963 kernel: audit: type=1334 audit(1734100508.516:95): prog-id=4 op=UNLOAD Dec 13 14:35:09.015975 kernel: audit: type=1334 audit(1734100508.516:96): prog-id=5 op=UNLOAD Dec 13 14:35:09.015986 kernel: audit: type=1334 audit(1734100508.521:97): prog-id=15 op=LOAD Dec 13 14:35:09.015998 kernel: audit: type=1334 audit(1734100508.521:98): prog-id=12 op=UNLOAD Dec 13 14:35:09.016011 kernel: audit: type=1334 audit(1734100508.526:99): prog-id=16 op=LOAD Dec 13 14:35:09.016020 kernel: audit: type=1334 audit(1734100508.530:100): prog-id=17 op=LOAD Dec 13 14:35:09.016032 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:35:09.016047 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:35:09.016057 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:35:09.016070 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:35:09.016083 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:35:09.016092 systemd[1]: Created slice system-getty.slice. Dec 13 14:35:09.016106 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:35:09.016119 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:35:09.016128 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:35:09.016143 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:35:09.016155 systemd[1]: Created slice user.slice. Dec 13 14:35:09.016165 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:35:09.016177 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:35:09.016189 systemd[1]: Set up automount boot.automount. Dec 13 14:35:09.016199 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:35:09.016212 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:35:09.016223 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:35:09.016234 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:35:09.016259 systemd[1]: Reached target integritysetup.target. Dec 13 14:35:09.016270 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:35:09.016282 systemd[1]: Reached target remote-fs.target. Dec 13 14:35:09.016293 systemd[1]: Reached target slices.target. Dec 13 14:35:09.016305 systemd[1]: Reached target swap.target. Dec 13 14:35:09.016315 systemd[1]: Reached target torcx.target. Dec 13 14:35:09.016328 systemd[1]: Reached target veritysetup.target. Dec 13 14:35:09.016341 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:35:09.016352 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:35:09.016366 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:35:09.016378 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:35:09.016389 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:35:09.016404 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:35:09.016415 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:35:09.016426 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:35:09.016438 systemd[1]: Mounting media.mount... Dec 13 14:35:09.016450 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:09.016460 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:35:09.016472 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:35:09.016485 systemd[1]: Mounting tmp.mount... Dec 13 14:35:09.016495 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:35:09.016509 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:35:09.016522 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:35:09.016531 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:35:09.016544 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:35:09.016556 systemd[1]: Starting modprobe@drm.service... Dec 13 14:35:09.016566 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:35:09.016579 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:35:09.016591 systemd[1]: Starting modprobe@loop.service... Dec 13 14:35:09.016601 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:35:09.016616 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:35:09.016629 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:35:09.016639 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:35:09.016652 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:35:09.016665 systemd[1]: Stopped systemd-journald.service. Dec 13 14:35:09.016675 systemd[1]: Starting systemd-journald.service... Dec 13 14:35:09.016687 kernel: loop: module loaded Dec 13 14:35:09.016699 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:35:09.016709 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:35:09.016724 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:35:09.016737 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:35:09.016747 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:35:09.016760 systemd[1]: Stopped verity-setup.service. Dec 13 14:35:09.016773 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:09.016783 kernel: fuse: init (API version 7.34) Dec 13 14:35:09.016795 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:35:09.016807 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:35:09.016823 systemd-journald[1109]: Journal started Dec 13 14:35:09.016872 systemd-journald[1109]: Runtime Journal (/run/log/journal/fad252b8d7ba45be96455bdb6d7a5e84) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:34:56.526000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:34:57.238000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:34:57.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:34:57.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:34:57.276000 audit: BPF prog-id=10 op=LOAD Dec 13 14:34:57.276000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:34:57.281000 audit: BPF prog-id=11 op=LOAD Dec 13 14:34:57.281000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:34:58.927000 audit[1028]: AVC avc: denied { associate } for pid=1028 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:34:58.927000 audit[1028]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1011 pid=1028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:58.927000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:34:58.935000 audit[1028]: AVC avc: denied { associate } for pid=1028 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:34:58.935000 audit[1028]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=1011 pid=1028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:58.935000 audit: CWD cwd="/" Dec 13 14:34:58.935000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:58.935000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:58.935000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:35:08.508000 audit: BPF prog-id=12 op=LOAD Dec 13 14:35:08.508000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:35:08.512000 audit: BPF prog-id=13 op=LOAD Dec 13 14:35:08.516000 audit: BPF prog-id=14 op=LOAD Dec 13 14:35:08.516000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:35:08.516000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:35:08.521000 audit: BPF prog-id=15 op=LOAD Dec 13 14:35:08.521000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:35:08.526000 audit: BPF prog-id=16 op=LOAD Dec 13 14:35:08.530000 audit: BPF prog-id=17 op=LOAD Dec 13 14:35:08.530000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:35:08.530000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:35:08.535000 audit: BPF prog-id=18 op=LOAD Dec 13 14:35:08.535000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:35:08.557000 audit: BPF prog-id=19 op=LOAD Dec 13 14:35:08.557000 audit: BPF prog-id=20 op=LOAD Dec 13 14:35:08.557000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:35:08.557000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:35:08.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:08.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:08.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:08.579000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:35:08.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:08.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:08.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:08.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:08.908000 audit: BPF prog-id=21 op=LOAD Dec 13 14:35:08.908000 audit: BPF prog-id=22 op=LOAD Dec 13 14:35:08.908000 audit: BPF prog-id=23 op=LOAD Dec 13 14:35:08.908000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:35:08.909000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:35:08.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.012000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:35:09.012000 audit[1109]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc11792840 a2=4000 a3=7ffc117928dc items=0 ppid=1 pid=1109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.012000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:34:58.885365 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:35:08.507040 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:34:58.885754 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:35:08.558167 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:34:58.885777 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:34:58.885815 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:34:58.885826 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:34:58.885872 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:34:58.885886 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:34:58.886104 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:34:58.886160 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:34:58.886176 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:34:58.899714 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:34:58.899751 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:34:58.899770 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:34:58.899783 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:34:58.899799 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:34:58.899813 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:34:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:35:07.408546 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:35:07Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:35:07.408787 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:35:07Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:35:07.408909 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:35:07Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:35:09.026583 systemd[1]: Started systemd-journald.service. Dec 13 14:35:07.409072 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:35:07Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:35:07.409120 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:35:07Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:35:07.409173 /usr/lib/systemd/system-generators/torcx-generator[1028]: time="2024-12-13T14:35:07Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:35:09.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.028858 systemd[1]: Mounted media.mount. Dec 13 14:35:09.031063 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:35:09.033229 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:35:09.036002 systemd[1]: Mounted tmp.mount. Dec 13 14:35:09.038083 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:35:09.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.040580 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:35:09.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.043117 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:35:09.043567 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:35:09.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.046048 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:35:09.046181 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:35:09.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.048421 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:35:09.048556 systemd[1]: Finished modprobe@drm.service. Dec 13 14:35:09.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.050833 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:35:09.050971 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:35:09.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.053605 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:35:09.053744 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:35:09.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.057187 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:35:09.057352 systemd[1]: Finished modprobe@loop.service. Dec 13 14:35:09.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.060050 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:35:09.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.062848 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:35:09.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.065630 systemd[1]: Reached target network-pre.target. Dec 13 14:35:09.068917 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:35:09.072485 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:35:09.075961 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:35:09.105331 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:35:09.108695 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:35:09.111265 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:35:09.112505 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:35:09.114913 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:35:09.115977 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:35:09.120396 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:35:09.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.123196 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:35:09.125795 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:35:09.128938 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:35:09.142647 systemd-journald[1109]: Time spent on flushing to /var/log/journal/fad252b8d7ba45be96455bdb6d7a5e84 is 19.101ms for 1148 entries. Dec 13 14:35:09.142647 systemd-journald[1109]: System Journal (/var/log/journal/fad252b8d7ba45be96455bdb6d7a5e84) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:35:09.212967 systemd-journald[1109]: Received client request to flush runtime journal. Dec 13 14:35:09.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.146596 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:35:09.150128 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:35:09.187672 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:35:09.213853 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:35:09.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.274720 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:35:09.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.278319 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:35:09.287409 udevadm[1153]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:35:09.701515 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:35:09.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.711876 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:35:10.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:10.015044 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:35:10.389383 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:35:10.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:10.392000 audit: BPF prog-id=24 op=LOAD Dec 13 14:35:10.392000 audit: BPF prog-id=25 op=LOAD Dec 13 14:35:10.392000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:35:10.392000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:35:10.393516 systemd[1]: Starting systemd-udevd.service... Dec 13 14:35:10.411412 systemd-udevd[1156]: Using default interface naming scheme 'v252'. Dec 13 14:35:10.633705 systemd[1]: Started systemd-udevd.service. Dec 13 14:35:10.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:10.637000 audit: BPF prog-id=26 op=LOAD Dec 13 14:35:10.638551 systemd[1]: Starting systemd-networkd.service... Dec 13 14:35:10.671455 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:35:10.732000 audit: BPF prog-id=27 op=LOAD Dec 13 14:35:10.733445 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:35:10.732000 audit: BPF prog-id=28 op=LOAD Dec 13 14:35:10.732000 audit: BPF prog-id=29 op=LOAD Dec 13 14:35:10.751000 audit[1165]: AVC avc: denied { confidentiality } for pid=1165 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:35:10.772029 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:35:10.772115 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:35:10.783225 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:35:10.783349 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:35:10.783384 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:35:10.783408 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:35:11.745931 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:35:11.751656 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:35:10.751000 audit[1165]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5606a49a69c0 a1=f884 a2=7f8c9a473bc5 a3=5 items=12 ppid=1156 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.751000 audit: CWD cwd="/" Dec 13 14:35:10.751000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=1 name=(null) inode=15221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=2 name=(null) inode=15221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=3 name=(null) inode=15222 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=4 name=(null) inode=15221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=5 name=(null) inode=15223 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=6 name=(null) inode=15221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=7 name=(null) inode=15224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=8 name=(null) inode=15221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=9 name=(null) inode=15225 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=10 name=(null) inode=15221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PATH item=11 name=(null) inode=15226 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:10.751000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:35:11.783670 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:35:11.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:11.792461 systemd[1]: Started systemd-userdbd.service. Dec 13 14:35:11.808657 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:35:11.808746 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:35:11.819532 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:35:11.826940 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:35:11.905686 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1169) Dec 13 14:35:11.991871 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:35:12.071701 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Dec 13 14:35:12.130361 systemd-networkd[1162]: lo: Link UP Dec 13 14:35:12.130372 systemd-networkd[1162]: lo: Gained carrier Dec 13 14:35:12.130951 systemd-networkd[1162]: Enumeration completed Dec 13 14:35:12.131072 systemd[1]: Started systemd-networkd.service. Dec 13 14:35:12.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:12.135105 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:35:12.147055 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:35:12.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:12.151063 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:35:12.160016 systemd-networkd[1162]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:35:12.211678 kernel: mlx5_core 1bae:00:02.0 enP7086s1: Link up Dec 13 14:35:12.234660 kernel: hv_netvsc 7c1e5288-52ec-7c1e-5288-52ec7c1e5288 eth0: Data path switched to VF: enP7086s1 Dec 13 14:35:12.235067 systemd-networkd[1162]: enP7086s1: Link UP Dec 13 14:35:12.235248 systemd-networkd[1162]: eth0: Link UP Dec 13 14:35:12.235254 systemd-networkd[1162]: eth0: Gained carrier Dec 13 14:35:12.241930 systemd-networkd[1162]: enP7086s1: Gained carrier Dec 13 14:35:12.259744 systemd-networkd[1162]: eth0: DHCPv4 address 10.200.8.10/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:35:12.494273 lvm[1233]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:35:12.527851 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:35:12.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:12.530911 systemd[1]: Reached target cryptsetup.target. Dec 13 14:35:12.534732 systemd[1]: Starting lvm2-activation.service... Dec 13 14:35:12.539941 lvm[1234]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:35:12.564719 systemd[1]: Finished lvm2-activation.service. Dec 13 14:35:12.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:12.567363 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:35:12.569566 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:35:12.569601 systemd[1]: Reached target local-fs.target. Dec 13 14:35:12.571719 systemd[1]: Reached target machines.target. Dec 13 14:35:12.574855 systemd[1]: Starting ldconfig.service... Dec 13 14:35:12.577314 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:35:12.577402 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:35:12.578658 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:35:12.581823 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:35:12.585715 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:35:12.588890 systemd[1]: Starting systemd-sysext.service... Dec 13 14:35:12.613049 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1236 (bootctl) Dec 13 14:35:12.614323 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:35:12.637000 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:35:12.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:12.639763 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:35:12.990718 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:35:12.990938 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:35:13.048663 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:35:13.148662 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:35:13.170674 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:35:13.176956 (sd-sysext)[1248]: Using extensions 'kubernetes'. Dec 13 14:35:13.177444 (sd-sysext)[1248]: Merged extensions into '/usr'. Dec 13 14:35:13.194305 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:13.195929 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:35:13.196344 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.200042 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:35:13.202149 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:35:13.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.205100 systemd[1]: Starting modprobe@loop.service... Dec 13 14:35:13.205225 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.205364 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:35:13.205469 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:13.206449 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:35:13.206564 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:35:13.207837 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:35:13.207938 systemd[1]: Finished modprobe@loop.service. Dec 13 14:35:13.208605 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.214609 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:35:13.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.215972 systemd[1]: Finished systemd-sysext.service. Dec 13 14:35:13.216241 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:35:13.216343 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:35:13.218275 systemd[1]: Starting ensure-sysext.service... Dec 13 14:35:13.218559 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:35:13.227057 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:35:13.228737 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:35:13.229321 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:35:13.232898 systemd[1]: Reloading. Dec 13 14:35:13.243122 systemd-tmpfiles[1255]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:35:13.258013 systemd-tmpfiles[1255]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:35:13.274806 systemd-tmpfiles[1255]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:35:13.293573 /usr/lib/systemd/system-generators/torcx-generator[1275]: time="2024-12-13T14:35:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:35:13.293614 /usr/lib/systemd/system-generators/torcx-generator[1275]: time="2024-12-13T14:35:13Z" level=info msg="torcx already run" Dec 13 14:35:13.395863 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:35:13.395883 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:35:13.412530 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:35:13.477000 audit: BPF prog-id=30 op=LOAD Dec 13 14:35:13.477000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:35:13.478000 audit: BPF prog-id=31 op=LOAD Dec 13 14:35:13.478000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:35:13.478000 audit: BPF prog-id=32 op=LOAD Dec 13 14:35:13.479000 audit: BPF prog-id=33 op=LOAD Dec 13 14:35:13.479000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:35:13.479000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:35:13.480000 audit: BPF prog-id=34 op=LOAD Dec 13 14:35:13.480000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:35:13.480000 audit: BPF prog-id=35 op=LOAD Dec 13 14:35:13.480000 audit: BPF prog-id=36 op=LOAD Dec 13 14:35:13.480000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:35:13.480000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:35:13.481000 audit: BPF prog-id=37 op=LOAD Dec 13 14:35:13.481000 audit: BPF prog-id=38 op=LOAD Dec 13 14:35:13.481000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:35:13.481000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:35:13.495016 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:13.495334 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.497007 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:35:13.500107 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:35:13.503741 systemd[1]: Starting modprobe@loop.service... Dec 13 14:35:13.505913 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.506115 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:35:13.506323 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:13.507457 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:35:13.507613 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:35:13.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.510540 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:35:13.510702 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:35:13.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.513466 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:35:13.513605 systemd[1]: Finished modprobe@loop.service. Dec 13 14:35:13.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.517658 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:13.517963 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.519201 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:35:13.522628 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:35:13.525829 systemd[1]: Starting modprobe@loop.service... Dec 13 14:35:13.527996 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.528223 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:35:13.528387 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:13.529333 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:35:13.529482 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:35:13.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.532254 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:35:13.532395 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:35:13.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.535167 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:35:13.535305 systemd[1]: Finished modprobe@loop.service. Dec 13 14:35:13.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.540140 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:13.540471 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.541929 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:35:13.545089 systemd[1]: Starting modprobe@drm.service... Dec 13 14:35:13.548264 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:35:13.551390 systemd[1]: Starting modprobe@loop.service... Dec 13 14:35:13.553429 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.553612 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:35:13.553813 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:13.554685 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:35:13.554831 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:35:13.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.557583 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:35:13.557746 systemd[1]: Finished modprobe@drm.service. Dec 13 14:35:13.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.560269 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:35:13.560404 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:35:13.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.563706 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:35:13.563850 systemd[1]: Finished modprobe@loop.service. Dec 13 14:35:13.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.566705 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:35:13.566826 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:35:13.567973 systemd[1]: Finished ensure-sysext.service. Dec 13 14:35:13.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.816429 systemd-fsck[1244]: fsck.fat 4.2 (2021-01-31) Dec 13 14:35:13.816429 systemd-fsck[1244]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:35:13.818690 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:35:13.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.823277 systemd[1]: Mounting boot.mount... Dec 13 14:35:13.835788 systemd[1]: Mounted boot.mount. Dec 13 14:35:13.849525 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:35:13.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.889809 systemd-networkd[1162]: eth0: Gained IPv6LL Dec 13 14:35:13.895503 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:35:13.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.347927 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:35:15.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.352006 systemd[1]: Starting audit-rules.service... Dec 13 14:35:15.357054 kernel: kauditd_printk_skb: 131 callbacks suppressed Dec 13 14:35:15.357127 kernel: audit: type=1130 audit(1734100515.350:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.367542 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:35:15.370852 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:35:15.375484 systemd[1]: Starting systemd-resolved.service... Dec 13 14:35:15.388414 kernel: audit: type=1334 audit(1734100515.373:216): prog-id=39 op=LOAD Dec 13 14:35:15.373000 audit: BPF prog-id=39 op=LOAD Dec 13 14:35:15.379447 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:35:15.386506 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:35:15.377000 audit: BPF prog-id=40 op=LOAD Dec 13 14:35:15.393085 kernel: audit: type=1334 audit(1734100515.377:217): prog-id=40 op=LOAD Dec 13 14:35:15.403000 audit[1363]: SYSTEM_BOOT pid=1363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.406972 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:35:15.417649 kernel: audit: type=1127 audit(1734100515.403:218): pid=1363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.428664 kernel: audit: type=1130 audit(1734100515.417:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.470880 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:35:15.484658 kernel: audit: type=1130 audit(1734100515.473:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.473817 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:35:15.530786 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:35:15.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.533626 systemd[1]: Reached target time-set.target. Dec 13 14:35:15.548065 kernel: audit: type=1130 audit(1734100515.532:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.613674 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:35:15.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.621193 systemd-resolved[1358]: Positive Trust Anchors: Dec 13 14:35:15.621484 systemd-resolved[1358]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:35:15.621565 systemd-resolved[1358]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:35:15.629671 kernel: audit: type=1130 audit(1734100515.616:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.772540 systemd-timesyncd[1359]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). Dec 13 14:35:15.772612 systemd-timesyncd[1359]: Initial clock synchronization to Fri 2024-12-13 14:35:15.773353 UTC. Dec 13 14:35:15.786067 systemd-resolved[1358]: Using system hostname 'ci-3510.3.6-a-f5c8c23acc'. Dec 13 14:35:15.787598 augenrules[1373]: No rules Dec 13 14:35:15.786000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:35:15.788429 systemd[1]: Started systemd-resolved.service. Dec 13 14:35:15.811004 kernel: audit: type=1305 audit(1734100515.786:223): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:35:15.811076 kernel: audit: type=1300 audit(1734100515.786:223): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdeb716a40 a2=420 a3=0 items=0 ppid=1352 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:15.786000 audit[1373]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdeb716a40 a2=420 a3=0 items=0 ppid=1352 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:15.786000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:35:15.813917 systemd[1]: Finished audit-rules.service. Dec 13 14:35:15.816089 systemd[1]: Reached target network.target. Dec 13 14:35:15.817982 systemd[1]: Reached target network-online.target. Dec 13 14:35:15.820031 systemd[1]: Reached target nss-lookup.target. Dec 13 14:35:20.089684 ldconfig[1235]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:35:20.098617 systemd[1]: Finished ldconfig.service. Dec 13 14:35:20.102907 systemd[1]: Starting systemd-update-done.service... Dec 13 14:35:20.109651 systemd[1]: Finished systemd-update-done.service. Dec 13 14:35:20.112012 systemd[1]: Reached target sysinit.target. Dec 13 14:35:20.114019 systemd[1]: Started motdgen.path. Dec 13 14:35:20.115667 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:35:20.118533 systemd[1]: Started logrotate.timer. Dec 13 14:35:20.120298 systemd[1]: Started mdadm.timer. Dec 13 14:35:20.122134 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:35:20.124170 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:35:20.124213 systemd[1]: Reached target paths.target. Dec 13 14:35:20.125972 systemd[1]: Reached target timers.target. Dec 13 14:35:20.128124 systemd[1]: Listening on dbus.socket. Dec 13 14:35:20.130820 systemd[1]: Starting docker.socket... Dec 13 14:35:20.134970 systemd[1]: Listening on sshd.socket. Dec 13 14:35:20.137206 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:35:20.137620 systemd[1]: Listening on docker.socket. Dec 13 14:35:20.139621 systemd[1]: Reached target sockets.target. Dec 13 14:35:20.141514 systemd[1]: Reached target basic.target. Dec 13 14:35:20.143372 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:35:20.143405 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:35:20.144353 systemd[1]: Starting containerd.service... Dec 13 14:35:20.147401 systemd[1]: Starting dbus.service... Dec 13 14:35:20.150227 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:35:20.153308 systemd[1]: Starting extend-filesystems.service... Dec 13 14:35:20.156160 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:35:20.157705 systemd[1]: Starting kubelet.service... Dec 13 14:35:20.161007 systemd[1]: Starting motdgen.service... Dec 13 14:35:20.164004 systemd[1]: Started nvidia.service. Dec 13 14:35:20.167915 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:35:20.173724 systemd[1]: Starting sshd-keygen.service... Dec 13 14:35:20.178993 systemd[1]: Starting systemd-logind.service... Dec 13 14:35:20.183531 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:35:20.183629 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:35:20.184133 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:35:20.185422 systemd[1]: Starting update-engine.service... Dec 13 14:35:20.188635 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:35:20.195265 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:35:20.196520 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:35:20.228265 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:35:20.228533 systemd[1]: Finished motdgen.service. Dec 13 14:35:20.257935 env[1407]: time="2024-12-13T14:35:20.257896046Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:35:20.285226 jq[1383]: false Dec 13 14:35:20.285537 jq[1400]: true Dec 13 14:35:20.287898 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:35:20.288175 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:35:20.299863 extend-filesystems[1384]: Found loop1 Dec 13 14:35:20.301966 extend-filesystems[1384]: Found sda Dec 13 14:35:20.307957 extend-filesystems[1384]: Found sda1 Dec 13 14:35:20.307957 extend-filesystems[1384]: Found sda2 Dec 13 14:35:20.307957 extend-filesystems[1384]: Found sda3 Dec 13 14:35:20.307957 extend-filesystems[1384]: Found usr Dec 13 14:35:20.307957 extend-filesystems[1384]: Found sda4 Dec 13 14:35:20.307957 extend-filesystems[1384]: Found sda6 Dec 13 14:35:20.307957 extend-filesystems[1384]: Found sda7 Dec 13 14:35:20.307957 extend-filesystems[1384]: Found sda9 Dec 13 14:35:20.307957 extend-filesystems[1384]: Checking size of /dev/sda9 Dec 13 14:35:20.316770 systemd-logind[1396]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 13 14:35:20.335501 jq[1418]: true Dec 13 14:35:20.325020 systemd-logind[1396]: New seat seat0. Dec 13 14:35:20.369932 env[1407]: time="2024-12-13T14:35:20.369054694Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:35:20.369932 env[1407]: time="2024-12-13T14:35:20.369215701Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.371422497Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.371460399Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.371742311Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.371764212Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.371781613Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.371795314Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.371887618Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.372202832Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.372417641Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:35:20.372673 env[1407]: time="2024-12-13T14:35:20.372442742Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:35:20.373121 env[1407]: time="2024-12-13T14:35:20.372515645Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:35:20.373121 env[1407]: time="2024-12-13T14:35:20.372532746Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387048179Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387091981Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387110482Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387161284Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387183285Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387245488Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387266388Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387286089Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387305290Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387324091Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387342492Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387360993Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387481898Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:35:20.387718 env[1407]: time="2024-12-13T14:35:20.387566702Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:35:20.388661 env[1407]: time="2024-12-13T14:35:20.388509743Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:35:20.388661 env[1407]: time="2024-12-13T14:35:20.388559145Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.388661 env[1407]: time="2024-12-13T14:35:20.388578246Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.388647649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.388830857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.388850658Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.388867358Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.388883559Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.388903660Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.388918461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.388942362Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.388961362Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.389094368Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.389110569Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.389127670Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.389141570Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:35:20.390662 env[1407]: time="2024-12-13T14:35:20.389160771Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:35:20.391071 env[1407]: time="2024-12-13T14:35:20.389175272Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:35:20.391071 env[1407]: time="2024-12-13T14:35:20.389197473Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:35:20.391071 env[1407]: time="2024-12-13T14:35:20.389235674Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:35:20.390724 systemd[1]: Started containerd.service. Dec 13 14:35:20.391216 env[1407]: time="2024-12-13T14:35:20.389467884Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:35:20.391216 env[1407]: time="2024-12-13T14:35:20.389531687Z" level=info msg="Connect containerd service" Dec 13 14:35:20.391216 env[1407]: time="2024-12-13T14:35:20.389578989Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:35:20.391216 env[1407]: time="2024-12-13T14:35:20.390218317Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:35:20.391216 env[1407]: time="2024-12-13T14:35:20.390501630Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:35:20.391216 env[1407]: time="2024-12-13T14:35:20.390550132Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:35:20.391216 env[1407]: time="2024-12-13T14:35:20.390604434Z" level=info msg="containerd successfully booted in 0.133428s" Dec 13 14:35:20.437629 env[1407]: time="2024-12-13T14:35:20.404625446Z" level=info msg="Start subscribing containerd event" Dec 13 14:35:20.437629 env[1407]: time="2024-12-13T14:35:20.404724750Z" level=info msg="Start recovering state" Dec 13 14:35:20.437629 env[1407]: time="2024-12-13T14:35:20.404812054Z" level=info msg="Start event monitor" Dec 13 14:35:20.437629 env[1407]: time="2024-12-13T14:35:20.404826754Z" level=info msg="Start snapshots syncer" Dec 13 14:35:20.437629 env[1407]: time="2024-12-13T14:35:20.404846255Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:35:20.437629 env[1407]: time="2024-12-13T14:35:20.404857556Z" level=info msg="Start streaming server" Dec 13 14:35:20.418240 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:35:20.437949 extend-filesystems[1384]: Old size kept for /dev/sda9 Dec 13 14:35:20.437949 extend-filesystems[1384]: Found sr0 Dec 13 14:35:20.418440 systemd[1]: Finished extend-filesystems.service. Dec 13 14:35:20.457389 bash[1435]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:35:20.457403 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:35:20.468337 dbus-daemon[1382]: [system] SELinux support is enabled Dec 13 14:35:20.468536 systemd[1]: Started dbus.service. Dec 13 14:35:20.473018 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:35:20.473057 systemd[1]: Reached target system-config.target. Dec 13 14:35:20.475250 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:35:20.475274 systemd[1]: Reached target user-config.target. Dec 13 14:35:20.477727 systemd[1]: Started systemd-logind.service. Dec 13 14:35:20.552290 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:35:21.114596 update_engine[1399]: I1213 14:35:21.113209 1399 main.cc:92] Flatcar Update Engine starting Dec 13 14:35:21.195297 systemd[1]: Started update-engine.service. Dec 13 14:35:21.196084 update_engine[1399]: I1213 14:35:21.195977 1399 update_check_scheduler.cc:74] Next update check in 4m51s Dec 13 14:35:21.200095 systemd[1]: Started locksmithd.service. Dec 13 14:35:21.416008 systemd[1]: Started kubelet.service. Dec 13 14:35:22.289782 kubelet[1486]: E1213 14:35:22.289715 1486 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:35:22.292357 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:35:22.292529 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:35:22.292847 systemd[1]: kubelet.service: Consumed 1.185s CPU time. Dec 13 14:35:22.572004 locksmithd[1483]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:35:22.817310 sshd_keygen[1398]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:35:22.837455 systemd[1]: Finished sshd-keygen.service. Dec 13 14:35:22.848970 systemd[1]: Starting issuegen.service... Dec 13 14:35:22.852464 systemd[1]: Started waagent.service. Dec 13 14:35:22.857101 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:35:22.857280 systemd[1]: Finished issuegen.service. Dec 13 14:35:22.860614 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:35:22.881490 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:35:22.885492 systemd[1]: Started getty@tty1.service. Dec 13 14:35:22.889263 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:35:22.891910 systemd[1]: Reached target getty.target. Dec 13 14:35:22.893985 systemd[1]: Reached target multi-user.target. Dec 13 14:35:22.897671 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:35:22.907709 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:35:22.907880 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:35:22.917971 systemd[1]: Startup finished in 889ms (firmware) + 27.643s (loader) + 895ms (kernel) + 13.275s (initrd) + 25.993s (userspace) = 1min 8.697s. Dec 13 14:35:23.293873 login[1511]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 14:35:23.294376 login[1510]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:35:23.318280 systemd[1]: Created slice user-500.slice. Dec 13 14:35:23.319793 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:35:23.322460 systemd-logind[1396]: New session 2 of user core. Dec 13 14:35:23.362691 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:35:23.364501 systemd[1]: Starting user@500.service... Dec 13 14:35:23.381512 (systemd)[1514]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:23.583226 systemd[1514]: Queued start job for default target default.target. Dec 13 14:35:23.583942 systemd[1514]: Reached target paths.target. Dec 13 14:35:23.583982 systemd[1514]: Reached target sockets.target. Dec 13 14:35:23.584011 systemd[1514]: Reached target timers.target. Dec 13 14:35:23.584036 systemd[1514]: Reached target basic.target. Dec 13 14:35:23.584154 systemd[1]: Started user@500.service. Dec 13 14:35:23.585383 systemd[1]: Started session-2.scope. Dec 13 14:35:23.585952 systemd[1514]: Reached target default.target. Dec 13 14:35:23.586143 systemd[1514]: Startup finished in 198ms. Dec 13 14:35:24.296609 login[1511]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:35:24.301873 systemd-logind[1396]: New session 1 of user core. Dec 13 14:35:24.302410 systemd[1]: Started session-1.scope. Dec 13 14:35:29.146310 waagent[1505]: 2024-12-13T14:35:29.146200Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:35:29.149921 waagent[1505]: 2024-12-13T14:35:29.149839Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:35:29.151983 waagent[1505]: 2024-12-13T14:35:29.151915Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:35:29.154392 waagent[1505]: 2024-12-13T14:35:29.154316Z INFO Daemon Daemon Run daemon Dec 13 14:35:29.156845 waagent[1505]: 2024-12-13T14:35:29.156783Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:35:29.169797 waagent[1505]: 2024-12-13T14:35:29.169679Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:35:29.176542 waagent[1505]: 2024-12-13T14:35:29.176435Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:35:29.206507 waagent[1505]: 2024-12-13T14:35:29.176842Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:35:29.206507 waagent[1505]: 2024-12-13T14:35:29.177699Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:35:29.206507 waagent[1505]: 2024-12-13T14:35:29.179034Z INFO Daemon Daemon Activate resource disk Dec 13 14:35:29.206507 waagent[1505]: 2024-12-13T14:35:29.179754Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:35:29.206507 waagent[1505]: 2024-12-13T14:35:29.187610Z INFO Daemon Daemon Found device: None Dec 13 14:35:29.206507 waagent[1505]: 2024-12-13T14:35:29.188647Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:35:29.206507 waagent[1505]: 2024-12-13T14:35:29.189469Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:35:29.206507 waagent[1505]: 2024-12-13T14:35:29.191114Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:35:29.206507 waagent[1505]: 2024-12-13T14:35:29.192209Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:35:29.209225 waagent[1505]: 2024-12-13T14:35:29.209091Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:35:29.216196 waagent[1505]: 2024-12-13T14:35:29.216081Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:35:29.224384 waagent[1505]: 2024-12-13T14:35:29.216497Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:35:29.224384 waagent[1505]: 2024-12-13T14:35:29.217369Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:35:29.330718 waagent[1505]: 2024-12-13T14:35:29.330561Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:35:29.401538 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:35:29.420895 waagent[1505]: 2024-12-13T14:35:29.420750Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:35:29.427456 waagent[1505]: 2024-12-13T14:35:29.421329Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:35:29.427456 waagent[1505]: 2024-12-13T14:35:29.422344Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:35:29.427456 waagent[1505]: 2024-12-13T14:35:29.423118Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:35:29.427456 waagent[1505]: 2024-12-13T14:35:29.424258Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:35:29.427456 waagent[1505]: 2024-12-13T14:35:29.424975Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:35:29.549925 waagent[1505]: 2024-12-13T14:35:29.549833Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:35:29.553728 waagent[1505]: 2024-12-13T14:35:29.553678Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:35:29.556525 waagent[1505]: 2024-12-13T14:35:29.556463Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:35:29.908063 waagent[1505]: 2024-12-13T14:35:29.907908Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:35:29.919230 waagent[1505]: 2024-12-13T14:35:29.919148Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:35:29.924318 waagent[1505]: 2024-12-13T14:35:29.919569Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:35:29.998980 waagent[1505]: 2024-12-13T14:35:29.998849Z INFO Daemon Daemon Found private key matching thumbprint 30D2C4E8767938C8CDC9B01872EC274543E31F65 Dec 13 14:35:30.003897 waagent[1505]: 2024-12-13T14:35:30.003818Z INFO Daemon Daemon Certificate with thumbprint F5318DFD02863D5EE03D7D9231D5A3A76BF7E3CC has no matching private key. Dec 13 14:35:30.009484 waagent[1505]: 2024-12-13T14:35:30.009413Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:35:30.031594 waagent[1505]: 2024-12-13T14:35:30.031520Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 147ae14a-0fd9-4743-ba88-9be16b9be865 New eTag: 1585852603436428108] Dec 13 14:35:30.037206 waagent[1505]: 2024-12-13T14:35:30.037134Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:35:30.051675 waagent[1505]: 2024-12-13T14:35:30.051571Z INFO Daemon Daemon Starting provisioning Dec 13 14:35:30.055211 waagent[1505]: 2024-12-13T14:35:30.055143Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:35:30.057725 waagent[1505]: 2024-12-13T14:35:30.057668Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-f5c8c23acc] Dec 13 14:35:30.079069 waagent[1505]: 2024-12-13T14:35:30.078947Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-f5c8c23acc] Dec 13 14:35:30.082743 waagent[1505]: 2024-12-13T14:35:30.082664Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:35:30.087760 waagent[1505]: 2024-12-13T14:35:30.087690Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:35:30.102119 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:35:30.102370 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:35:30.102443 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:35:30.102801 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:35:30.108688 systemd-networkd[1162]: eth0: DHCPv6 lease lost Dec 13 14:35:30.109943 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:35:30.110104 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:35:30.112580 systemd[1]: Starting systemd-networkd.service... Dec 13 14:35:30.143515 systemd-networkd[1561]: enP7086s1: Link UP Dec 13 14:35:30.143525 systemd-networkd[1561]: enP7086s1: Gained carrier Dec 13 14:35:30.144820 systemd-networkd[1561]: eth0: Link UP Dec 13 14:35:30.144829 systemd-networkd[1561]: eth0: Gained carrier Dec 13 14:35:30.145247 systemd-networkd[1561]: lo: Link UP Dec 13 14:35:30.145256 systemd-networkd[1561]: lo: Gained carrier Dec 13 14:35:30.145548 systemd-networkd[1561]: eth0: Gained IPv6LL Dec 13 14:35:30.146614 systemd-networkd[1561]: Enumeration completed Dec 13 14:35:30.146714 systemd[1]: Started systemd-networkd.service. Dec 13 14:35:30.150168 waagent[1505]: 2024-12-13T14:35:30.147814Z INFO Daemon Daemon Create user account if not exists Dec 13 14:35:30.150168 waagent[1505]: 2024-12-13T14:35:30.148401Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:35:30.150168 waagent[1505]: 2024-12-13T14:35:30.149365Z INFO Daemon Daemon Configure sudoer Dec 13 14:35:30.151536 waagent[1505]: 2024-12-13T14:35:30.151473Z INFO Daemon Daemon Configure sshd Dec 13 14:35:30.152539 waagent[1505]: 2024-12-13T14:35:30.152486Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:35:30.160734 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:35:30.165136 systemd-networkd[1561]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:35:30.191712 systemd-networkd[1561]: eth0: DHCPv4 address 10.200.8.10/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:35:30.194800 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:35:31.277161 waagent[1505]: 2024-12-13T14:35:31.277068Z INFO Daemon Daemon Provisioning complete Dec 13 14:35:31.293132 waagent[1505]: 2024-12-13T14:35:31.293045Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:35:31.296636 waagent[1505]: 2024-12-13T14:35:31.296557Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:35:31.302130 waagent[1505]: 2024-12-13T14:35:31.302059Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:35:31.566996 waagent[1570]: 2024-12-13T14:35:31.566821Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:35:31.567729 waagent[1570]: 2024-12-13T14:35:31.567661Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:35:31.567886 waagent[1570]: 2024-12-13T14:35:31.567828Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:35:31.578927 waagent[1570]: 2024-12-13T14:35:31.578851Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:35:31.579090 waagent[1570]: 2024-12-13T14:35:31.579034Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:35:31.640431 waagent[1570]: 2024-12-13T14:35:31.640305Z INFO ExtHandler ExtHandler Found private key matching thumbprint 30D2C4E8767938C8CDC9B01872EC274543E31F65 Dec 13 14:35:31.640677 waagent[1570]: 2024-12-13T14:35:31.640584Z INFO ExtHandler ExtHandler Certificate with thumbprint F5318DFD02863D5EE03D7D9231D5A3A76BF7E3CC has no matching private key. Dec 13 14:35:31.640914 waagent[1570]: 2024-12-13T14:35:31.640862Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:35:31.654567 waagent[1570]: 2024-12-13T14:35:31.654503Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 8b22bb7e-2fc1-4810-b821-029fb9a7cd47 New eTag: 1585852603436428108] Dec 13 14:35:31.655096 waagent[1570]: 2024-12-13T14:35:31.655039Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:35:31.717062 waagent[1570]: 2024-12-13T14:35:31.716903Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:35:31.727001 waagent[1570]: 2024-12-13T14:35:31.726915Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1570 Dec 13 14:35:31.730383 waagent[1570]: 2024-12-13T14:35:31.730317Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:35:31.731590 waagent[1570]: 2024-12-13T14:35:31.731533Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:35:31.824237 waagent[1570]: 2024-12-13T14:35:31.824174Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:35:31.824647 waagent[1570]: 2024-12-13T14:35:31.824579Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:35:31.832723 waagent[1570]: 2024-12-13T14:35:31.832668Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:35:31.833174 waagent[1570]: 2024-12-13T14:35:31.833117Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:35:31.834218 waagent[1570]: 2024-12-13T14:35:31.834155Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:35:31.835492 waagent[1570]: 2024-12-13T14:35:31.835434Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:35:31.835920 waagent[1570]: 2024-12-13T14:35:31.835867Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:35:31.836069 waagent[1570]: 2024-12-13T14:35:31.836022Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:35:31.836572 waagent[1570]: 2024-12-13T14:35:31.836516Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:35:31.836880 waagent[1570]: 2024-12-13T14:35:31.836824Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:35:31.836880 waagent[1570]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:35:31.836880 waagent[1570]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:35:31.836880 waagent[1570]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:35:31.836880 waagent[1570]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:35:31.836880 waagent[1570]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:35:31.836880 waagent[1570]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:35:31.840035 waagent[1570]: 2024-12-13T14:35:31.839827Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:35:31.840778 waagent[1570]: 2024-12-13T14:35:31.840720Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:35:31.840962 waagent[1570]: 2024-12-13T14:35:31.840912Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:35:31.841570 waagent[1570]: 2024-12-13T14:35:31.841510Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:35:31.841733 waagent[1570]: 2024-12-13T14:35:31.841685Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:35:31.841865 waagent[1570]: 2024-12-13T14:35:31.841821Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:35:31.842762 waagent[1570]: 2024-12-13T14:35:31.842703Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:35:31.842917 waagent[1570]: 2024-12-13T14:35:31.842867Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:35:31.843676 waagent[1570]: 2024-12-13T14:35:31.843596Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:35:31.843845 waagent[1570]: 2024-12-13T14:35:31.843794Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:35:31.844116 waagent[1570]: 2024-12-13T14:35:31.844066Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:35:31.855911 waagent[1570]: 2024-12-13T14:35:31.855870Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:35:31.856510 waagent[1570]: 2024-12-13T14:35:31.856473Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:35:31.857334 waagent[1570]: 2024-12-13T14:35:31.857288Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:35:31.880255 waagent[1570]: 2024-12-13T14:35:31.880154Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1561' Dec 13 14:35:31.903711 waagent[1570]: 2024-12-13T14:35:31.903614Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:35:32.002323 waagent[1570]: 2024-12-13T14:35:32.002205Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:35:32.002323 waagent[1570]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:35:32.002323 waagent[1570]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:35:32.002323 waagent[1570]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:88:52:ec brd ff:ff:ff:ff:ff:ff Dec 13 14:35:32.002323 waagent[1570]: 3: enP7086s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:88:52:ec brd ff:ff:ff:ff:ff:ff\ altname enP7086p0s2 Dec 13 14:35:32.002323 waagent[1570]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:35:32.002323 waagent[1570]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:35:32.002323 waagent[1570]: 2: eth0 inet 10.200.8.10/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:35:32.002323 waagent[1570]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:35:32.002323 waagent[1570]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:35:32.002323 waagent[1570]: 2: eth0 inet6 fe80::7e1e:52ff:fe88:52ec/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:35:32.251347 waagent[1570]: 2024-12-13T14:35:32.251218Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:35:32.305527 waagent[1505]: 2024-12-13T14:35:32.305377Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:35:32.311350 waagent[1505]: 2024-12-13T14:35:32.311278Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:35:32.319011 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:35:32.319279 systemd[1]: Stopped kubelet.service. Dec 13 14:35:32.319332 systemd[1]: kubelet.service: Consumed 1.185s CPU time. Dec 13 14:35:32.321117 systemd[1]: Starting kubelet.service... Dec 13 14:35:32.981031 systemd[1]: Started kubelet.service. Dec 13 14:35:33.065169 kubelet[1607]: E1213 14:35:33.065111 1607 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:35:33.069958 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:35:33.070123 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:35:34.001461 waagent[1602]: 2024-12-13T14:35:34.001352Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:35:34.002180 waagent[1602]: 2024-12-13T14:35:34.002114Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:35:34.002327 waagent[1602]: 2024-12-13T14:35:34.002273Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:35:34.002471 waagent[1602]: 2024-12-13T14:35:34.002426Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Dec 13 14:35:34.011979 waagent[1602]: 2024-12-13T14:35:34.011883Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:35:34.012357 waagent[1602]: 2024-12-13T14:35:34.012301Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:35:34.012514 waagent[1602]: 2024-12-13T14:35:34.012466Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:35:34.024529 waagent[1602]: 2024-12-13T14:35:34.024460Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:35:34.033616 waagent[1602]: 2024-12-13T14:35:34.033553Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:35:34.034519 waagent[1602]: 2024-12-13T14:35:34.034459Z INFO ExtHandler Dec 13 14:35:34.034679 waagent[1602]: 2024-12-13T14:35:34.034613Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 0f9f7617-421c-4055-bafd-902526538673 eTag: 1585852603436428108 source: Fabric] Dec 13 14:35:34.035381 waagent[1602]: 2024-12-13T14:35:34.035325Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:35:34.036447 waagent[1602]: 2024-12-13T14:35:34.036386Z INFO ExtHandler Dec 13 14:35:34.036586 waagent[1602]: 2024-12-13T14:35:34.036537Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:35:34.043425 waagent[1602]: 2024-12-13T14:35:34.043375Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:35:34.043851 waagent[1602]: 2024-12-13T14:35:34.043804Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:35:34.064166 waagent[1602]: 2024-12-13T14:35:34.064105Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:35:34.127445 waagent[1602]: 2024-12-13T14:35:34.127324Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F5318DFD02863D5EE03D7D9231D5A3A76BF7E3CC', 'hasPrivateKey': False} Dec 13 14:35:34.128435 waagent[1602]: 2024-12-13T14:35:34.128368Z INFO ExtHandler Downloaded certificate {'thumbprint': '30D2C4E8767938C8CDC9B01872EC274543E31F65', 'hasPrivateKey': True} Dec 13 14:35:34.129403 waagent[1602]: 2024-12-13T14:35:34.129342Z INFO ExtHandler Fetch goal state completed Dec 13 14:35:34.148365 waagent[1602]: 2024-12-13T14:35:34.148276Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:35:34.159378 waagent[1602]: 2024-12-13T14:35:34.159299Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1602 Dec 13 14:35:34.162414 waagent[1602]: 2024-12-13T14:35:34.162341Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:35:34.163344 waagent[1602]: 2024-12-13T14:35:34.163287Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:35:34.163614 waagent[1602]: 2024-12-13T14:35:34.163560Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:35:34.165565 waagent[1602]: 2024-12-13T14:35:34.165509Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:35:34.169988 waagent[1602]: 2024-12-13T14:35:34.169934Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:35:34.170331 waagent[1602]: 2024-12-13T14:35:34.170277Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:35:34.178156 waagent[1602]: 2024-12-13T14:35:34.178103Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:35:34.178592 waagent[1602]: 2024-12-13T14:35:34.178536Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:35:34.184231 waagent[1602]: 2024-12-13T14:35:34.184143Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Dec 13 14:35:34.185261 waagent[1602]: 2024-12-13T14:35:34.185194Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:35:34.186615 waagent[1602]: 2024-12-13T14:35:34.186556Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:35:34.187016 waagent[1602]: 2024-12-13T14:35:34.186963Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:35:34.187171 waagent[1602]: 2024-12-13T14:35:34.187124Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:35:34.187699 waagent[1602]: 2024-12-13T14:35:34.187626Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:35:34.188079 waagent[1602]: 2024-12-13T14:35:34.188028Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:35:34.189245 waagent[1602]: 2024-12-13T14:35:34.189188Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:35:34.189363 waagent[1602]: 2024-12-13T14:35:34.189299Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:35:34.189564 waagent[1602]: 2024-12-13T14:35:34.189513Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:35:34.189965 waagent[1602]: 2024-12-13T14:35:34.189916Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:35:34.189965 waagent[1602]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:35:34.189965 waagent[1602]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:35:34.189965 waagent[1602]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:35:34.189965 waagent[1602]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:35:34.189965 waagent[1602]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:35:34.189965 waagent[1602]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:35:34.190439 waagent[1602]: 2024-12-13T14:35:34.190382Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:35:34.190674 waagent[1602]: 2024-12-13T14:35:34.190606Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:35:34.193003 waagent[1602]: 2024-12-13T14:35:34.192881Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:35:34.194963 waagent[1602]: 2024-12-13T14:35:34.194907Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:35:34.195621 waagent[1602]: 2024-12-13T14:35:34.195573Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:35:34.198155 waagent[1602]: 2024-12-13T14:35:34.197997Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:35:34.198861 waagent[1602]: 2024-12-13T14:35:34.198801Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:35:34.211723 waagent[1602]: 2024-12-13T14:35:34.211600Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:35:34.216558 waagent[1602]: 2024-12-13T14:35:34.216492Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:35:34.216558 waagent[1602]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:35:34.216558 waagent[1602]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:35:34.216558 waagent[1602]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:88:52:ec brd ff:ff:ff:ff:ff:ff Dec 13 14:35:34.216558 waagent[1602]: 3: enP7086s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:88:52:ec brd ff:ff:ff:ff:ff:ff\ altname enP7086p0s2 Dec 13 14:35:34.216558 waagent[1602]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:35:34.216558 waagent[1602]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:35:34.216558 waagent[1602]: 2: eth0 inet 10.200.8.10/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:35:34.216558 waagent[1602]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:35:34.216558 waagent[1602]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:35:34.216558 waagent[1602]: 2: eth0 inet6 fe80::7e1e:52ff:fe88:52ec/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:35:34.251441 waagent[1602]: 2024-12-13T14:35:34.251208Z INFO ExtHandler ExtHandler Dec 13 14:35:34.251765 waagent[1602]: 2024-12-13T14:35:34.251655Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: cd2ed31f-b067-43dd-bf79-e82ad303e9a9 correlation 5cb49d1c-116f-4ca3-8631-4e6e4775e768 created: 2024-12-13T14:34:03.054222Z] Dec 13 14:35:34.253098 waagent[1602]: 2024-12-13T14:35:34.253027Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:35:34.256418 waagent[1602]: 2024-12-13T14:35:34.256364Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 5 ms] Dec 13 14:35:34.288983 waagent[1602]: 2024-12-13T14:35:34.288916Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:35:34.304338 waagent[1602]: 2024-12-13T14:35:34.304273Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 75451B75-9334-4173-93A9-11334785D050;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:35:34.377918 waagent[1602]: 2024-12-13T14:35:34.377799Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Dec 13 14:35:34.377918 waagent[1602]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:35:34.377918 waagent[1602]: pkts bytes target prot opt in out source destination Dec 13 14:35:34.377918 waagent[1602]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:35:34.377918 waagent[1602]: pkts bytes target prot opt in out source destination Dec 13 14:35:34.377918 waagent[1602]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:35:34.377918 waagent[1602]: pkts bytes target prot opt in out source destination Dec 13 14:35:34.377918 waagent[1602]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:35:34.377918 waagent[1602]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:35:34.377918 waagent[1602]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:35:34.385048 waagent[1602]: 2024-12-13T14:35:34.384947Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:35:34.385048 waagent[1602]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:35:34.385048 waagent[1602]: pkts bytes target prot opt in out source destination Dec 13 14:35:34.385048 waagent[1602]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:35:34.385048 waagent[1602]: pkts bytes target prot opt in out source destination Dec 13 14:35:34.385048 waagent[1602]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:35:34.385048 waagent[1602]: pkts bytes target prot opt in out source destination Dec 13 14:35:34.385048 waagent[1602]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:35:34.385048 waagent[1602]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:35:34.385048 waagent[1602]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:35:34.385577 waagent[1602]: 2024-12-13T14:35:34.385525Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:35:43.319075 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:35:43.319410 systemd[1]: Stopped kubelet.service. Dec 13 14:35:43.321315 systemd[1]: Starting kubelet.service... Dec 13 14:35:43.398587 systemd[1]: Started kubelet.service. Dec 13 14:35:43.992616 kubelet[1668]: E1213 14:35:43.992558 1668 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:35:43.994586 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:35:43.994765 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:35:54.069081 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:35:54.069421 systemd[1]: Stopped kubelet.service. Dec 13 14:35:54.071430 systemd[1]: Starting kubelet.service... Dec 13 14:35:54.150119 systemd[1]: Started kubelet.service. Dec 13 14:35:54.202688 kubelet[1678]: E1213 14:35:54.202617 1678 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:35:54.204461 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:35:54.204620 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:35:59.882381 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Dec 13 14:36:04.319091 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:36:04.319400 systemd[1]: Stopped kubelet.service. Dec 13 14:36:04.321431 systemd[1]: Starting kubelet.service... Dec 13 14:36:04.545084 systemd[1]: Started kubelet.service. Dec 13 14:36:04.973601 kubelet[1688]: E1213 14:36:04.973544 1688 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:36:04.975467 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:36:04.975627 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:06.780887 update_engine[1399]: I1213 14:36:06.780802 1399 update_attempter.cc:509] Updating boot flags... Dec 13 14:36:10.679353 systemd[1]: Created slice system-sshd.slice. Dec 13 14:36:10.681858 systemd[1]: Started sshd@0-10.200.8.10:22-10.200.16.10:33722.service. Dec 13 14:36:11.616938 sshd[1761]: Accepted publickey for core from 10.200.16.10 port 33722 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:11.618633 sshd[1761]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:11.623343 systemd-logind[1396]: New session 3 of user core. Dec 13 14:36:11.623969 systemd[1]: Started session-3.scope. Dec 13 14:36:12.233109 systemd[1]: Started sshd@1-10.200.8.10:22-10.200.16.10:33734.service. Dec 13 14:36:12.944264 sshd[1769]: Accepted publickey for core from 10.200.16.10 port 33734 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:12.945857 sshd[1769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:12.950533 systemd[1]: Started session-4.scope. Dec 13 14:36:12.951031 systemd-logind[1396]: New session 4 of user core. Dec 13 14:36:13.445944 sshd[1769]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:13.449195 systemd[1]: sshd@1-10.200.8.10:22-10.200.16.10:33734.service: Deactivated successfully. Dec 13 14:36:13.450222 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:36:13.451015 systemd-logind[1396]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:36:13.451937 systemd-logind[1396]: Removed session 4. Dec 13 14:36:13.565349 systemd[1]: Started sshd@2-10.200.8.10:22-10.200.16.10:33742.service. Dec 13 14:36:14.278154 sshd[1775]: Accepted publickey for core from 10.200.16.10 port 33742 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:14.279801 sshd[1775]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:14.284769 systemd[1]: Started session-5.scope. Dec 13 14:36:14.285337 systemd-logind[1396]: New session 5 of user core. Dec 13 14:36:14.773863 sshd[1775]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:14.777093 systemd[1]: sshd@2-10.200.8.10:22-10.200.16.10:33742.service: Deactivated successfully. Dec 13 14:36:14.778100 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:36:14.778859 systemd-logind[1396]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:36:14.779764 systemd-logind[1396]: Removed session 5. Dec 13 14:36:14.892881 systemd[1]: Started sshd@3-10.200.8.10:22-10.200.16.10:33746.service. Dec 13 14:36:15.069264 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:36:15.069543 systemd[1]: Stopped kubelet.service. Dec 13 14:36:15.071531 systemd[1]: Starting kubelet.service... Dec 13 14:36:15.401218 systemd[1]: Started kubelet.service. Dec 13 14:36:15.447128 kubelet[1787]: E1213 14:36:15.447081 1787 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:36:15.448869 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:36:15.448984 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:15.618847 sshd[1781]: Accepted publickey for core from 10.200.16.10 port 33746 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:15.619435 sshd[1781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:15.624513 systemd[1]: Started session-6.scope. Dec 13 14:36:15.624965 systemd-logind[1396]: New session 6 of user core. Dec 13 14:36:16.113313 sshd[1781]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:16.116660 systemd[1]: sshd@3-10.200.8.10:22-10.200.16.10:33746.service: Deactivated successfully. Dec 13 14:36:16.117682 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:36:16.118343 systemd-logind[1396]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:36:16.119101 systemd-logind[1396]: Removed session 6. Dec 13 14:36:16.231837 systemd[1]: Started sshd@4-10.200.8.10:22-10.200.16.10:33756.service. Dec 13 14:36:16.943114 sshd[1797]: Accepted publickey for core from 10.200.16.10 port 33756 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:16.944802 sshd[1797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:16.950444 systemd[1]: Started session-7.scope. Dec 13 14:36:16.951198 systemd-logind[1396]: New session 7 of user core. Dec 13 14:36:17.611931 sudo[1800]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:36:17.612225 sudo[1800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:17.632871 dbus-daemon[1382]: Э\xfe aU: received setenforce notice (enforcing=-2061385936) Dec 13 14:36:17.635046 sudo[1800]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:17.767129 sshd[1797]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:17.770397 systemd[1]: sshd@4-10.200.8.10:22-10.200.16.10:33756.service: Deactivated successfully. Dec 13 14:36:17.771310 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:36:17.771957 systemd-logind[1396]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:36:17.772804 systemd-logind[1396]: Removed session 7. Dec 13 14:36:17.886456 systemd[1]: Started sshd@5-10.200.8.10:22-10.200.16.10:33766.service. Dec 13 14:36:18.601199 sshd[1804]: Accepted publickey for core from 10.200.16.10 port 33766 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:18.602931 sshd[1804]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:18.607799 systemd[1]: Started session-8.scope. Dec 13 14:36:18.608396 systemd-logind[1396]: New session 8 of user core. Dec 13 14:36:18.987941 sudo[1808]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:36:18.988548 sudo[1808]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:18.991406 sudo[1808]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:18.995985 sudo[1807]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:36:18.996265 sudo[1807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:19.004733 systemd[1]: Stopping audit-rules.service... Dec 13 14:36:19.005000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:36:19.006796 auditctl[1811]: No rules Dec 13 14:36:19.009490 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:36:19.009550 kernel: audit: type=1305 audit(1734100579.005:224): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:36:19.007205 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:36:19.007357 systemd[1]: Stopped audit-rules.service. Dec 13 14:36:19.009239 systemd[1]: Starting audit-rules.service... Dec 13 14:36:19.005000 audit[1811]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeacd8c0a0 a2=420 a3=0 items=0 ppid=1 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:19.030455 kernel: audit: type=1300 audit(1734100579.005:224): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeacd8c0a0 a2=420 a3=0 items=0 ppid=1 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:19.030543 kernel: audit: type=1327 audit(1734100579.005:224): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:36:19.005000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:36:19.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.036844 augenrules[1828]: No rules Dec 13 14:36:19.037658 systemd[1]: Finished audit-rules.service. Dec 13 14:36:19.038722 sudo[1807]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:19.044671 kernel: audit: type=1131 audit(1734100579.005:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.044737 kernel: audit: type=1130 audit(1734100579.034:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.034000 audit[1807]: USER_END pid=1807 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.067353 kernel: audit: type=1106 audit(1734100579.034:227): pid=1807 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.067406 kernel: audit: type=1104 audit(1734100579.034:228): pid=1807 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.034000 audit[1807]: CRED_DISP pid=1807 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.155335 sshd[1804]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:19.156000 audit[1804]: USER_END pid=1804 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:19.159015 systemd-logind[1396]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:36:19.160452 systemd[1]: sshd@5-10.200.8.10:22-10.200.16.10:33766.service: Deactivated successfully. Dec 13 14:36:19.161301 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:36:19.162690 systemd-logind[1396]: Removed session 8. Dec 13 14:36:19.156000 audit[1804]: CRED_DISP pid=1804 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:19.184712 kernel: audit: type=1106 audit(1734100579.156:229): pid=1804 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:19.184767 kernel: audit: type=1104 audit(1734100579.156:230): pid=1804 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:19.184789 kernel: audit: type=1131 audit(1734100579.156:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.10:22-10.200.16.10:33766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.10:22-10.200.16.10:33766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.275529 systemd[1]: Started sshd@6-10.200.8.10:22-10.200.16.10:36352.service. Dec 13 14:36:19.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.10:22-10.200.16.10:36352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:19.986000 audit[1834]: USER_ACCT pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:19.987635 sshd[1834]: Accepted publickey for core from 10.200.16.10 port 36352 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:19.988000 audit[1834]: CRED_ACQ pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:19.988000 audit[1834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2f788280 a2=3 a3=0 items=0 ppid=1 pid=1834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:19.988000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:19.989341 sshd[1834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:19.994419 systemd[1]: Started session-9.scope. Dec 13 14:36:19.994886 systemd-logind[1396]: New session 9 of user core. Dec 13 14:36:19.998000 audit[1834]: USER_START pid=1834 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:20.000000 audit[1836]: CRED_ACQ pid=1836 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:20.373000 audit[1837]: USER_ACCT pid=1837 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.373000 audit[1837]: CRED_REFR pid=1837 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.374451 sudo[1837]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:36:20.374840 sudo[1837]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:20.376000 audit[1837]: USER_START pid=1837 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.388006 systemd[1]: Starting coreos-metadata.service... Dec 13 14:36:20.463458 coreos-metadata[1841]: Dec 13 14:36:20.463 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:36:20.465995 coreos-metadata[1841]: Dec 13 14:36:20.465 INFO Fetch successful Dec 13 14:36:20.466274 coreos-metadata[1841]: Dec 13 14:36:20.466 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Dec 13 14:36:20.467818 coreos-metadata[1841]: Dec 13 14:36:20.467 INFO Fetch successful Dec 13 14:36:20.468185 coreos-metadata[1841]: Dec 13 14:36:20.468 INFO Fetching http://168.63.129.16/machine/ef69a972-0d6d-46c6-82e3-b3519107496b/c3b7436b%2Da2c7%2D4a60%2Db6bc%2D6e4ea0c4e7e2.%5Fci%2D3510.3.6%2Da%2Df5c8c23acc?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Dec 13 14:36:20.469713 coreos-metadata[1841]: Dec 13 14:36:20.469 INFO Fetch successful Dec 13 14:36:20.502564 coreos-metadata[1841]: Dec 13 14:36:20.502 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:36:20.514443 coreos-metadata[1841]: Dec 13 14:36:20.514 INFO Fetch successful Dec 13 14:36:20.523227 systemd[1]: Finished coreos-metadata.service. Dec 13 14:36:20.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:23.703408 systemd[1]: Stopped kubelet.service. Dec 13 14:36:23.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:23.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:23.706329 systemd[1]: Starting kubelet.service... Dec 13 14:36:23.739032 systemd[1]: Reloading. Dec 13 14:36:23.834627 /usr/lib/systemd/system-generators/torcx-generator[1900]: time="2024-12-13T14:36:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:36:23.834678 /usr/lib/systemd/system-generators/torcx-generator[1900]: time="2024-12-13T14:36:23Z" level=info msg="torcx already run" Dec 13 14:36:23.933562 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:36:23.933807 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:36:23.955814 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:36:24.044327 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 14:36:24.044464 kernel: audit: type=1400 audit(1734100584.022:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068454 kernel: audit: type=1400 audit(1734100584.022:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068560 kernel: audit: type=1400 audit(1734100584.022:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.094099 kernel: audit: type=1400 audit(1734100584.022:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.094207 kernel: audit: type=1400 audit(1734100584.022:248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.107158 kernel: audit: type=1400 audit(1734100584.022:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.119971 kernel: audit: type=1400 audit(1734100584.022:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.152505 kernel: audit: type=1400 audit(1734100584.022:251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.152626 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:36:24.152676 kernel: audit: type=1400 audit(1734100584.022:252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.057000 audit: BPF prog-id=47 op=LOAD Dec 13 14:36:24.057000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:36:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.067000 audit: BPF prog-id=48 op=LOAD Dec 13 14:36:24.067000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:36:24.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.079000 audit: BPF prog-id=49 op=LOAD Dec 13 14:36:24.079000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:36:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit: BPF prog-id=50 op=LOAD Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.093000 audit: BPF prog-id=51 op=LOAD Dec 13 14:36:24.093000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:36:24.093000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:36:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.119000 audit: BPF prog-id=52 op=LOAD Dec 13 14:36:24.119000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:36:24.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit: BPF prog-id=56 op=LOAD Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.153000 audit: BPF prog-id=57 op=LOAD Dec 13 14:36:24.153000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:36:24.153000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.154000 audit: BPF prog-id=58 op=LOAD Dec 13 14:36:24.154000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:36:24.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit: BPF prog-id=59 op=LOAD Dec 13 14:36:24.157000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit: BPF prog-id=60 op=LOAD Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:24.157000 audit: BPF prog-id=61 op=LOAD Dec 13 14:36:24.157000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:36:24.157000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:36:24.174428 systemd[1]: Started kubelet.service. Dec 13 14:36:24.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:24.183125 systemd[1]: Stopping kubelet.service... Dec 13 14:36:24.184230 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:36:24.184421 systemd[1]: Stopped kubelet.service. Dec 13 14:36:24.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:24.186060 systemd[1]: Starting kubelet.service... Dec 13 14:36:24.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:24.291136 systemd[1]: Started kubelet.service. Dec 13 14:36:24.919614 kubelet[1973]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:24.919614 kubelet[1973]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:36:24.919614 kubelet[1973]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:24.920197 kubelet[1973]: I1213 14:36:24.919752 1973 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:36:25.158484 kubelet[1973]: I1213 14:36:25.158446 1973 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:36:25.158484 kubelet[1973]: I1213 14:36:25.158474 1973 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:36:25.158761 kubelet[1973]: I1213 14:36:25.158739 1973 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:36:25.189722 kubelet[1973]: I1213 14:36:25.189612 1973 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:36:25.201734 kubelet[1973]: I1213 14:36:25.201706 1973 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:36:25.201984 kubelet[1973]: I1213 14:36:25.201964 1973 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:36:25.202200 kubelet[1973]: I1213 14:36:25.202178 1973 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:36:25.202369 kubelet[1973]: I1213 14:36:25.202212 1973 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:36:25.202369 kubelet[1973]: I1213 14:36:25.202225 1973 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:36:25.202369 kubelet[1973]: I1213 14:36:25.202333 1973 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:25.202500 kubelet[1973]: I1213 14:36:25.202427 1973 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:36:25.202500 kubelet[1973]: I1213 14:36:25.202444 1973 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:36:25.202500 kubelet[1973]: I1213 14:36:25.202473 1973 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:36:25.202500 kubelet[1973]: I1213 14:36:25.202487 1973 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:36:25.205982 kubelet[1973]: I1213 14:36:25.205962 1973 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:36:25.206217 kubelet[1973]: E1213 14:36:25.206196 1973 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:25.206281 kubelet[1973]: E1213 14:36:25.206253 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:25.209109 kubelet[1973]: I1213 14:36:25.209083 1973 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:36:25.209196 kubelet[1973]: W1213 14:36:25.209148 1973 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:36:25.209723 kubelet[1973]: I1213 14:36:25.209704 1973 server.go:1256] "Started kubelet" Dec 13 14:36:25.210000 audit[1973]: AVC avc: denied { mac_admin } for pid=1973 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:25.210000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:25.210000 audit[1973]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009441e0 a1=c000913800 a2=c0009441b0 a3=25 items=0 ppid=1 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.210000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:25.210000 audit[1973]: AVC avc: denied { mac_admin } for pid=1973 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:25.210000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:25.210000 audit[1973]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00025b340 a1=c000913818 a2=c000944270 a3=25 items=0 ppid=1 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.210000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:25.211761 kubelet[1973]: I1213 14:36:25.211155 1973 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:36:25.211761 kubelet[1973]: I1213 14:36:25.211200 1973 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:36:25.211761 kubelet[1973]: I1213 14:36:25.211289 1973 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:36:25.214000 audit[1983]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:25.214000 audit[1983]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffdf625b70 a2=0 a3=7fffdf625b5c items=0 ppid=1973 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:36:25.215000 audit[1984]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:25.215000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd836f5c40 a2=0 a3=7ffd836f5c2c items=0 ppid=1973 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:36:25.217987 kubelet[1973]: I1213 14:36:25.217966 1973 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:36:25.219390 kubelet[1973]: I1213 14:36:25.218713 1973 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:36:25.219931 kubelet[1973]: I1213 14:36:25.219910 1973 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:36:25.220125 kubelet[1973]: I1213 14:36:25.220107 1973 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:36:25.222511 kubelet[1973]: I1213 14:36:25.222482 1973 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:36:25.223000 audit[1986]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:25.223000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc45eef50 a2=0 a3=7fffc45eef3c items=0 ppid=1973 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:25.224753 kubelet[1973]: W1213 14:36:25.224735 1973 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.200.8.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:36:25.224877 kubelet[1973]: E1213 14:36:25.224864 1973 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:36:25.225119 kubelet[1973]: W1213 14:36:25.225101 1973 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:36:25.225215 kubelet[1973]: E1213 14:36:25.225205 1973 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:36:25.226378 kubelet[1973]: I1213 14:36:25.225699 1973 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:36:25.226378 kubelet[1973]: I1213 14:36:25.225762 1973 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:36:25.226717 kubelet[1973]: E1213 14:36:25.226699 1973 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.8.10.1810c34b6a38422b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.8.10,UID:10.200.8.10,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.8.10,},FirstTimestamp:2024-12-13 14:36:25.209676331 +0000 UTC m=+0.913743992,LastTimestamp:2024-12-13 14:36:25.209676331 +0000 UTC m=+0.913743992,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.8.10,}" Dec 13 14:36:25.226000 audit[1988]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:25.226000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffef8172ba0 a2=0 a3=7ffef8172b8c items=0 ppid=1973 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:25.228296 kubelet[1973]: I1213 14:36:25.228268 1973 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:36:25.228385 kubelet[1973]: I1213 14:36:25.228341 1973 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:36:25.233403 kubelet[1973]: E1213 14:36:25.233382 1973 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:36:25.234157 kubelet[1973]: I1213 14:36:25.234137 1973 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:36:25.247387 kubelet[1973]: E1213 14:36:25.247364 1973 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.10\" not found" node="10.200.8.10" Dec 13 14:36:25.248529 kubelet[1973]: I1213 14:36:25.248507 1973 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:36:25.248529 kubelet[1973]: I1213 14:36:25.248527 1973 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:36:25.248700 kubelet[1973]: I1213 14:36:25.248543 1973 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:25.259739 kubelet[1973]: I1213 14:36:25.259720 1973 policy_none.go:49] "None policy: Start" Dec 13 14:36:25.260404 kubelet[1973]: I1213 14:36:25.260391 1973 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:36:25.260515 kubelet[1973]: I1213 14:36:25.260505 1973 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:36:25.267832 systemd[1]: Created slice kubepods.slice. Dec 13 14:36:25.272343 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:36:25.277594 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:36:25.286542 kubelet[1973]: I1213 14:36:25.286519 1973 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:36:25.286739 kubelet[1973]: I1213 14:36:25.286725 1973 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:36:25.286000 audit[1973]: AVC avc: denied { mac_admin } for pid=1973 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:25.286000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:25.286000 audit[1973]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b44120 a1=c000f023a8 a2=c000b440f0 a3=25 items=0 ppid=1 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.286000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:25.287220 kubelet[1973]: I1213 14:36:25.287209 1973 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:36:25.288000 audit[1996]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:25.288000 audit[1996]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff938a7120 a2=0 a3=7fff938a710c items=0 ppid=1973 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:36:25.289970 kubelet[1973]: I1213 14:36:25.289960 1973 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:36:25.291000 audit[1997]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1997 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:25.291000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffa73d0120 a2=0 a3=7fffa73d010c items=0 ppid=1973 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:36:25.292217 kubelet[1973]: I1213 14:36:25.292207 1973 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:36:25.292279 kubelet[1973]: I1213 14:36:25.292273 1973 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:36:25.292330 kubelet[1973]: I1213 14:36:25.292324 1973 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:36:25.292434 kubelet[1973]: E1213 14:36:25.292428 1973 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:36:25.293254 kubelet[1973]: E1213 14:36:25.293233 1973 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.10\" not found" Dec 13 14:36:25.294000 audit[1999]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:25.294000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeae705a10 a2=0 a3=7ffeae7059fc items=0 ppid=1973 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:36:25.295000 audit[2000]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:25.295000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc3c5ec3f0 a2=0 a3=7ffc3c5ec3dc items=0 ppid=1973 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:36:25.296000 audit[1998]: NETFILTER_CFG table=mangle:13 family=2 entries=1 op=nft_register_chain pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:25.296000 audit[1998]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc17773810 a2=0 a3=10e3 items=0 ppid=1973 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:36:25.296000 audit[2001]: NETFILTER_CFG table=filter:14 family=10 entries=2 op=nft_register_chain pid=2001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:25.296000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff40182450 a2=0 a3=7fff4018243c items=0 ppid=1973 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:36:25.297000 audit[2002]: NETFILTER_CFG table=nat:15 family=2 entries=2 op=nft_register_chain pid=2002 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:25.297000 audit[2002]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc99385940 a2=0 a3=7ffc9938592c items=0 ppid=1973 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:36:25.299000 audit[2003]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:25.299000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff60a9f450 a2=0 a3=7fff60a9f43c items=0 ppid=1973 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:25.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:36:25.323977 kubelet[1973]: I1213 14:36:25.323958 1973 kubelet_node_status.go:73] "Attempting to register node" node="10.200.8.10" Dec 13 14:36:25.330941 kubelet[1973]: I1213 14:36:25.330912 1973 kubelet_node_status.go:76] "Successfully registered node" node="10.200.8.10" Dec 13 14:36:25.348204 kubelet[1973]: E1213 14:36:25.348177 1973 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.10\" not found" Dec 13 14:36:25.449228 kubelet[1973]: E1213 14:36:25.449065 1973 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.10\" not found" Dec 13 14:36:25.549661 kubelet[1973]: E1213 14:36:25.549586 1973 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.10\" not found" Dec 13 14:36:25.650417 kubelet[1973]: E1213 14:36:25.650360 1973 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.10\" not found" Dec 13 14:36:25.751355 kubelet[1973]: E1213 14:36:25.751228 1973 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.10\" not found" Dec 13 14:36:25.816081 sudo[1837]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:25.815000 audit[1837]: USER_END pid=1837 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:25.815000 audit[1837]: CRED_DISP pid=1837 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:25.852009 kubelet[1973]: E1213 14:36:25.851961 1973 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.10\" not found" Dec 13 14:36:25.932512 sshd[1834]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:25.933000 audit[1834]: USER_END pid=1834 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:25.933000 audit[1834]: CRED_DISP pid=1834 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:25.936127 systemd[1]: sshd@6-10.200.8.10:22-10.200.16.10:36352.service: Deactivated successfully. Dec 13 14:36:25.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.10:22-10.200.16.10:36352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:25.937193 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:36:25.938088 systemd-logind[1396]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:36:25.939309 systemd-logind[1396]: Removed session 9. Dec 13 14:36:25.952599 kubelet[1973]: E1213 14:36:25.952565 1973 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.10\" not found" Dec 13 14:36:26.053630 kubelet[1973]: E1213 14:36:26.053412 1973 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.10\" not found" Dec 13 14:36:26.154221 kubelet[1973]: E1213 14:36:26.154166 1973 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.10\" not found" Dec 13 14:36:26.160348 kubelet[1973]: I1213 14:36:26.160320 1973 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:36:26.160656 kubelet[1973]: W1213 14:36:26.160618 1973 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:36:26.160769 kubelet[1973]: W1213 14:36:26.160616 1973 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:36:26.206972 kubelet[1973]: E1213 14:36:26.206911 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:26.255113 kubelet[1973]: I1213 14:36:26.255078 1973 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:36:26.255564 env[1407]: time="2024-12-13T14:36:26.255506520Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:36:26.256098 kubelet[1973]: I1213 14:36:26.255836 1973 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:36:27.207143 kubelet[1973]: E1213 14:36:27.207093 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:27.207143 kubelet[1973]: I1213 14:36:27.207117 1973 apiserver.go:52] "Watching apiserver" Dec 13 14:36:27.212278 kubelet[1973]: I1213 14:36:27.212248 1973 topology_manager.go:215] "Topology Admit Handler" podUID="300bf9e1-f071-4c39-bde5-4d974f0a64ea" podNamespace="calico-system" podName="calico-node-rrtgv" Dec 13 14:36:27.212432 kubelet[1973]: I1213 14:36:27.212388 1973 topology_manager.go:215] "Topology Admit Handler" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" podNamespace="calico-system" podName="csi-node-driver-qs9pw" Dec 13 14:36:27.212512 kubelet[1973]: I1213 14:36:27.212457 1973 topology_manager.go:215] "Topology Admit Handler" podUID="6836ac25-9c0f-4dc2-92c3-699471b30dae" podNamespace="kube-system" podName="kube-proxy-ltthc" Dec 13 14:36:27.212900 kubelet[1973]: E1213 14:36:27.212875 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qs9pw" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" Dec 13 14:36:27.219914 systemd[1]: Created slice kubepods-besteffort-pod6836ac25_9c0f_4dc2_92c3_699471b30dae.slice. Dec 13 14:36:27.226429 kubelet[1973]: I1213 14:36:27.226403 1973 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:36:27.231602 systemd[1]: Created slice kubepods-besteffort-pod300bf9e1_f071_4c39_bde5_4d974f0a64ea.slice. Dec 13 14:36:27.238925 kubelet[1973]: I1213 14:36:27.238903 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/300bf9e1-f071-4c39-bde5-4d974f0a64ea-cni-bin-dir\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239025 kubelet[1973]: I1213 14:36:27.238944 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/300bf9e1-f071-4c39-bde5-4d974f0a64ea-cni-log-dir\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239025 kubelet[1973]: I1213 14:36:27.238973 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/300bf9e1-f071-4c39-bde5-4d974f0a64ea-flexvol-driver-host\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239025 kubelet[1973]: I1213 14:36:27.239000 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e-socket-dir\") pod \"csi-node-driver-qs9pw\" (UID: \"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e\") " pod="calico-system/csi-node-driver-qs9pw" Dec 13 14:36:27.239158 kubelet[1973]: I1213 14:36:27.239029 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e-registration-dir\") pod \"csi-node-driver-qs9pw\" (UID: \"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e\") " pod="calico-system/csi-node-driver-qs9pw" Dec 13 14:36:27.239158 kubelet[1973]: I1213 14:36:27.239058 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/300bf9e1-f071-4c39-bde5-4d974f0a64ea-lib-modules\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239158 kubelet[1973]: I1213 14:36:27.239084 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/300bf9e1-f071-4c39-bde5-4d974f0a64ea-policysync\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239158 kubelet[1973]: I1213 14:36:27.239122 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/300bf9e1-f071-4c39-bde5-4d974f0a64ea-node-certs\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239158 kubelet[1973]: I1213 14:36:27.239153 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6836ac25-9c0f-4dc2-92c3-699471b30dae-xtables-lock\") pod \"kube-proxy-ltthc\" (UID: \"6836ac25-9c0f-4dc2-92c3-699471b30dae\") " pod="kube-system/kube-proxy-ltthc" Dec 13 14:36:27.239348 kubelet[1973]: I1213 14:36:27.239182 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2v9xb\" (UniqueName: \"kubernetes.io/projected/300bf9e1-f071-4c39-bde5-4d974f0a64ea-kube-api-access-2v9xb\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239348 kubelet[1973]: I1213 14:36:27.239211 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e-kubelet-dir\") pod \"csi-node-driver-qs9pw\" (UID: \"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e\") " pod="calico-system/csi-node-driver-qs9pw" Dec 13 14:36:27.239348 kubelet[1973]: I1213 14:36:27.239247 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6836ac25-9c0f-4dc2-92c3-699471b30dae-kube-proxy\") pod \"kube-proxy-ltthc\" (UID: \"6836ac25-9c0f-4dc2-92c3-699471b30dae\") " pod="kube-system/kube-proxy-ltthc" Dec 13 14:36:27.239348 kubelet[1973]: I1213 14:36:27.239278 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6836ac25-9c0f-4dc2-92c3-699471b30dae-lib-modules\") pod \"kube-proxy-ltthc\" (UID: \"6836ac25-9c0f-4dc2-92c3-699471b30dae\") " pod="kube-system/kube-proxy-ltthc" Dec 13 14:36:27.239348 kubelet[1973]: I1213 14:36:27.239307 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4hzjv\" (UniqueName: \"kubernetes.io/projected/6836ac25-9c0f-4dc2-92c3-699471b30dae-kube-api-access-4hzjv\") pod \"kube-proxy-ltthc\" (UID: \"6836ac25-9c0f-4dc2-92c3-699471b30dae\") " pod="kube-system/kube-proxy-ltthc" Dec 13 14:36:27.239535 kubelet[1973]: I1213 14:36:27.239334 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/300bf9e1-f071-4c39-bde5-4d974f0a64ea-xtables-lock\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239535 kubelet[1973]: I1213 14:36:27.239364 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/300bf9e1-f071-4c39-bde5-4d974f0a64ea-var-lib-calico\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239535 kubelet[1973]: I1213 14:36:27.239395 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/300bf9e1-f071-4c39-bde5-4d974f0a64ea-cni-net-dir\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239535 kubelet[1973]: I1213 14:36:27.239442 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n57qg\" (UniqueName: \"kubernetes.io/projected/e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e-kube-api-access-n57qg\") pod \"csi-node-driver-qs9pw\" (UID: \"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e\") " pod="calico-system/csi-node-driver-qs9pw" Dec 13 14:36:27.239535 kubelet[1973]: I1213 14:36:27.239473 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/300bf9e1-f071-4c39-bde5-4d974f0a64ea-tigera-ca-bundle\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239748 kubelet[1973]: I1213 14:36:27.239501 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/300bf9e1-f071-4c39-bde5-4d974f0a64ea-var-run-calico\") pod \"calico-node-rrtgv\" (UID: \"300bf9e1-f071-4c39-bde5-4d974f0a64ea\") " pod="calico-system/calico-node-rrtgv" Dec 13 14:36:27.239748 kubelet[1973]: I1213 14:36:27.239528 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e-varrun\") pod \"csi-node-driver-qs9pw\" (UID: \"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e\") " pod="calico-system/csi-node-driver-qs9pw" Dec 13 14:36:27.350306 kubelet[1973]: E1213 14:36:27.349993 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:27.350306 kubelet[1973]: W1213 14:36:27.350017 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:27.350306 kubelet[1973]: E1213 14:36:27.350044 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:27.359595 kubelet[1973]: E1213 14:36:27.359575 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:27.359751 kubelet[1973]: W1213 14:36:27.359735 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:27.359909 kubelet[1973]: E1213 14:36:27.359897 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:27.388932 kubelet[1973]: E1213 14:36:27.383260 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:27.388932 kubelet[1973]: W1213 14:36:27.383278 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:27.388932 kubelet[1973]: E1213 14:36:27.383298 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:27.392170 kubelet[1973]: E1213 14:36:27.392136 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:27.392170 kubelet[1973]: W1213 14:36:27.392165 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:27.392297 kubelet[1973]: E1213 14:36:27.392184 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:27.531516 env[1407]: time="2024-12-13T14:36:27.531371921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ltthc,Uid:6836ac25-9c0f-4dc2-92c3-699471b30dae,Namespace:kube-system,Attempt:0,}" Dec 13 14:36:27.535494 env[1407]: time="2024-12-13T14:36:27.535452301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rrtgv,Uid:300bf9e1-f071-4c39-bde5-4d974f0a64ea,Namespace:calico-system,Attempt:0,}" Dec 13 14:36:28.208010 kubelet[1973]: E1213 14:36:28.207968 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:28.346224 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1939200399.mount: Deactivated successfully. Dec 13 14:36:28.357172 env[1407]: time="2024-12-13T14:36:28.357125363Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.360210 env[1407]: time="2024-12-13T14:36:28.360177122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.370819 env[1407]: time="2024-12-13T14:36:28.370787724Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.373993 env[1407]: time="2024-12-13T14:36:28.373958885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.377243 env[1407]: time="2024-12-13T14:36:28.377210447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.379870 env[1407]: time="2024-12-13T14:36:28.379840398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.382519 env[1407]: time="2024-12-13T14:36:28.382486448Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.385103 env[1407]: time="2024-12-13T14:36:28.385071298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.464842 env[1407]: time="2024-12-13T14:36:28.454656028Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:28.464842 env[1407]: time="2024-12-13T14:36:28.454696929Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:28.464842 env[1407]: time="2024-12-13T14:36:28.454712130Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:28.464842 env[1407]: time="2024-12-13T14:36:28.454907233Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b90687d0d8310b51913076bf484ad40f31bdd01f739a81931762e71674c9812 pid=2021 runtime=io.containerd.runc.v2 Dec 13 14:36:28.465135 env[1407]: time="2024-12-13T14:36:28.464956926Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:28.465135 env[1407]: time="2024-12-13T14:36:28.464995026Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:28.465135 env[1407]: time="2024-12-13T14:36:28.465017227Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:28.465267 env[1407]: time="2024-12-13T14:36:28.465174730Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/74435d140deaf3aa5570299b0b18ed1f7b8a8b38788fdcb9c97562e7efb43ff2 pid=2039 runtime=io.containerd.runc.v2 Dec 13 14:36:28.491396 systemd[1]: Started cri-containerd-7b90687d0d8310b51913076bf484ad40f31bdd01f739a81931762e71674c9812.scope. Dec 13 14:36:28.509824 systemd[1]: Started cri-containerd-74435d140deaf3aa5570299b0b18ed1f7b8a8b38788fdcb9c97562e7efb43ff2.scope. Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.516000 audit: BPF prog-id=62 op=LOAD Dec 13 14:36:28.517000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.517000 audit[2048]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2021 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393036383764306438333130623531393133303736626634383461 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2021 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393036383764306438333130623531393133303736626634383461 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.518000 audit: BPF prog-id=63 op=LOAD Dec 13 14:36:28.518000 audit[2048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003c0980 items=0 ppid=2021 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393036383764306438333130623531393133303736626634383461 Dec 13 14:36:28.519000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.519000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.519000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.519000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.519000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.519000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.519000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.519000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.519000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.519000 audit: BPF prog-id=64 op=LOAD Dec 13 14:36:28.519000 audit[2048]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003c09c8 items=0 ppid=2021 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393036383764306438333130623531393133303736626634383461 Dec 13 14:36:28.520000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:36:28.520000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.520000 audit: BPF prog-id=65 op=LOAD Dec 13 14:36:28.520000 audit[2048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c0dd8 items=0 ppid=2021 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762393036383764306438333130623531393133303736626634383461 Dec 13 14:36:28.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.529000 audit: BPF prog-id=66 op=LOAD Dec 13 14:36:28.531000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.531000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734343335643134306465616633616135353730323939623062313865 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734343335643134306465616633616135353730323939623062313865 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.532000 audit: BPF prog-id=67 op=LOAD Dec 13 14:36:28.532000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025390 items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734343335643134306465616633616135353730323939623062313865 Dec 13 14:36:28.533000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.533000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.533000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.533000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.533000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.533000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.533000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.533000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.533000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.533000 audit: BPF prog-id=68 op=LOAD Dec 13 14:36:28.533000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000253d8 items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734343335643134306465616633616135353730323939623062313865 Dec 13 14:36:28.534000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:36:28.534000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:28.534000 audit: BPF prog-id=69 op=LOAD Dec 13 14:36:28.534000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000257e8 items=0 ppid=2039 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:28.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734343335643134306465616633616135353730323939623062313865 Dec 13 14:36:28.537453 env[1407]: time="2024-12-13T14:36:28.537362210Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ltthc,Uid:6836ac25-9c0f-4dc2-92c3-699471b30dae,Namespace:kube-system,Attempt:0,} returns sandbox id \"7b90687d0d8310b51913076bf484ad40f31bdd01f739a81931762e71674c9812\"" Dec 13 14:36:28.540724 env[1407]: time="2024-12-13T14:36:28.540329267Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:36:28.550454 env[1407]: time="2024-12-13T14:36:28.550421960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rrtgv,Uid:300bf9e1-f071-4c39-bde5-4d974f0a64ea,Namespace:calico-system,Attempt:0,} returns sandbox id \"74435d140deaf3aa5570299b0b18ed1f7b8a8b38788fdcb9c97562e7efb43ff2\"" Dec 13 14:36:29.208969 kubelet[1973]: E1213 14:36:29.208930 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:29.294681 kubelet[1973]: E1213 14:36:29.293683 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qs9pw" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" Dec 13 14:36:29.771671 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4196863065.mount: Deactivated successfully. Dec 13 14:36:30.209812 kubelet[1973]: E1213 14:36:30.209742 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:30.341228 env[1407]: time="2024-12-13T14:36:30.341177453Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:30.345976 env[1407]: time="2024-12-13T14:36:30.345937140Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:30.349561 env[1407]: time="2024-12-13T14:36:30.349515104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:30.352951 env[1407]: time="2024-12-13T14:36:30.352922466Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:30.353314 env[1407]: time="2024-12-13T14:36:30.353284673Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:36:30.354709 env[1407]: time="2024-12-13T14:36:30.354370892Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:36:30.358980 env[1407]: time="2024-12-13T14:36:30.358945375Z" level=info msg="CreateContainer within sandbox \"7b90687d0d8310b51913076bf484ad40f31bdd01f739a81931762e71674c9812\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:36:30.384543 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2105788765.mount: Deactivated successfully. Dec 13 14:36:30.393275 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1101663579.mount: Deactivated successfully. Dec 13 14:36:30.404357 env[1407]: time="2024-12-13T14:36:30.404316597Z" level=info msg="CreateContainer within sandbox \"7b90687d0d8310b51913076bf484ad40f31bdd01f739a81931762e71674c9812\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"695633884f3058eb1f04caec2013ee266105d4b55f0e2737963abe344aed7de6\"" Dec 13 14:36:30.405140 env[1407]: time="2024-12-13T14:36:30.405104811Z" level=info msg="StartContainer for \"695633884f3058eb1f04caec2013ee266105d4b55f0e2737963abe344aed7de6\"" Dec 13 14:36:30.422904 systemd[1]: Started cri-containerd-695633884f3058eb1f04caec2013ee266105d4b55f0e2737963abe344aed7de6.scope. Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.445600 kernel: kauditd_printk_skb: 386 callbacks suppressed Dec 13 14:36:30.445703 kernel: audit: type=1400 audit(1734100590.440:448): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd096f11a48 items=0 ppid=2021 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.480066 kernel: audit: type=1300 audit(1734100590.440:448): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd096f11a48 items=0 ppid=2021 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.480778 kernel: audit: type=1327 audit(1734100590.440:448): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353633333838346633303538656231663034636165633230313365 Dec 13 14:36:30.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353633333838346633303538656231663034636165633230313365 Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.527137 kernel: audit: type=1400 audit(1734100590.440:449): avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.527233 kernel: audit: type=1400 audit(1734100590.440:449): avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.540755 kernel: audit: type=1400 audit(1734100590.440:449): avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.543470 env[1407]: time="2024-12-13T14:36:30.543412916Z" level=info msg="StartContainer for \"695633884f3058eb1f04caec2013ee266105d4b55f0e2737963abe344aed7de6\" returns successfully" Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.573899 kernel: audit: type=1400 audit(1734100590.440:449): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.574020 kernel: audit: type=1400 audit(1734100590.440:449): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.586755 kernel: audit: type=1400 audit(1734100590.440:449): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.440000 audit: BPF prog-id=70 op=LOAD Dec 13 14:36:30.440000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00040c5d8 items=0 ppid=2021 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353633333838346633303538656231663034636165633230313365 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.602675 kernel: audit: type=1400 audit(1734100590.440:449): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit: BPF prog-id=71 op=LOAD Dec 13 14:36:30.458000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00040c628 items=0 ppid=2021 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353633333838346633303538656231663034636165633230313365 Dec 13 14:36:30.458000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:36:30.458000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:30.458000 audit: BPF prog-id=72 op=LOAD Dec 13 14:36:30.458000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00040c6b8 items=0 ppid=2021 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353633333838346633303538656231663034636165633230313365 Dec 13 14:36:30.631000 audit[2156]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:30.631000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe99bae620 a2=0 a3=7ffe99bae60c items=0 ppid=2115 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:36:30.632000 audit[2155]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.632000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff29940eb0 a2=0 a3=e9783d1a5581b92b items=0 ppid=2115 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:36:30.632000 audit[2157]: NETFILTER_CFG table=nat:19 family=10 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:30.632000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe53b5da10 a2=0 a3=7ffe53b5d9fc items=0 ppid=2115 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:36:30.634000 audit[2159]: NETFILTER_CFG table=filter:20 family=10 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:30.634000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcc78eda0 a2=0 a3=7fffcc78ed8c items=0 ppid=2115 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:36:30.635000 audit[2158]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.635000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff422bfac0 a2=0 a3=343d52c3387f967d items=0 ppid=2115 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:36:30.637000 audit[2160]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.637000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccc0e1150 a2=0 a3=7ffccc0e113c items=0 ppid=2115 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.637000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:36:30.737000 audit[2161]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.737000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc5bb52d30 a2=0 a3=7ffc5bb52d1c items=0 ppid=2115 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:36:30.742000 audit[2164]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.742000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffdf49d1b0 a2=0 a3=7fffdf49d19c items=0 ppid=2115 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:36:30.746000 audit[2167]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.746000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd6b851d00 a2=0 a3=7ffd6b851cec items=0 ppid=2115 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:36:30.748000 audit[2168]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.748000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff59c9add0 a2=0 a3=7fff59c9adbc items=0 ppid=2115 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:36:30.750000 audit[2170]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.750000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc948cd1f0 a2=0 a3=7ffc948cd1dc items=0 ppid=2115 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:36:30.751000 audit[2171]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.751000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb85ae7f0 a2=0 a3=7ffeb85ae7dc items=0 ppid=2115 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:36:30.754000 audit[2173]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.754000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdca11c9e0 a2=0 a3=7ffdca11c9cc items=0 ppid=2115 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:36:30.757000 audit[2176]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.757000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffff3ae560 a2=0 a3=7fffff3ae54c items=0 ppid=2115 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:36:30.758000 audit[2177]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.758000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5cd20c80 a2=0 a3=7ffc5cd20c6c items=0 ppid=2115 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:36:30.761000 audit[2179]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.761000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbc9e4580 a2=0 a3=7ffdbc9e456c items=0 ppid=2115 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:36:30.762000 audit[2180]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.762000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5ee052b0 a2=0 a3=7ffe5ee0529c items=0 ppid=2115 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:36:30.765000 audit[2182]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.765000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc10df7200 a2=0 a3=7ffc10df71ec items=0 ppid=2115 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:36:30.768000 audit[2185]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.768000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7d3c5f50 a2=0 a3=7ffc7d3c5f3c items=0 ppid=2115 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:36:30.772000 audit[2188]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.772000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3b42e4d0 a2=0 a3=7ffe3b42e4bc items=0 ppid=2115 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:36:30.773000 audit[2189]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.773000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe5852060 a2=0 a3=7fffe585204c items=0 ppid=2115 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:36:30.775000 audit[2191]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.775000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff66de3960 a2=0 a3=7fff66de394c items=0 ppid=2115 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:36:30.826000 audit[2196]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.826000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff15221320 a2=0 a3=7fff1522130c items=0 ppid=2115 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.826000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:36:30.828000 audit[2197]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.828000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff553338b0 a2=0 a3=7fff5533389c items=0 ppid=2115 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:36:30.830000 audit[2199]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:30.830000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff759911e0 a2=0 a3=7fff759911cc items=0 ppid=2115 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:36:30.856000 audit[2205]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:30.856000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf4a4d560 a2=0 a3=7ffdf4a4d54c items=0 ppid=2115 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:30.956000 audit[2205]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:30.956000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffdf4a4d560 a2=0 a3=7ffdf4a4d54c items=0 ppid=2115 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:30.985000 audit[2213]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:30.985000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff1e54ae00 a2=0 a3=7fff1e54adec items=0 ppid=2115 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:36:30.988000 audit[2215]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:30.988000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffec8001e00 a2=0 a3=7ffec8001dec items=0 ppid=2115 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:36:30.993000 audit[2218]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:30.993000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdcd09ce80 a2=0 a3=7ffdcd09ce6c items=0 ppid=2115 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:36:30.995000 audit[2219]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:30.995000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd014f45a0 a2=0 a3=7ffd014f458c items=0 ppid=2115 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.995000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:36:30.997000 audit[2221]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:30.997000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdaa22cdb0 a2=0 a3=7ffdaa22cd9c items=0 ppid=2115 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:36:30.998000 audit[2222]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:30.998000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff17611330 a2=0 a3=7fff1761131c items=0 ppid=2115 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:30.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:36:31.000000 audit[2224]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.000000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff19f1c1c0 a2=0 a3=7fff19f1c1ac items=0 ppid=2115 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:36:31.004000 audit[2227]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.004000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffb7ae82f0 a2=0 a3=7fffb7ae82dc items=0 ppid=2115 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:36:31.005000 audit[2228]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.005000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe19d1fe10 a2=0 a3=7ffe19d1fdfc items=0 ppid=2115 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.005000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:36:31.007000 audit[2230]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.007000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdcb8c3fb0 a2=0 a3=7ffdcb8c3f9c items=0 ppid=2115 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:36:31.009000 audit[2231]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.009000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7ceebe60 a2=0 a3=7ffd7ceebe4c items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:36:31.011000 audit[2233]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.011000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2d404660 a2=0 a3=7fff2d40464c items=0 ppid=2115 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:36:31.014000 audit[2236]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.014000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff8cc1edf0 a2=0 a3=7fff8cc1eddc items=0 ppid=2115 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:36:31.018000 audit[2239]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.018000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7d327d40 a2=0 a3=7ffc7d327d2c items=0 ppid=2115 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:36:31.019000 audit[2240]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.019000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1c556440 a2=0 a3=7fff1c55642c items=0 ppid=2115 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:36:31.021000 audit[2242]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.021000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffaeaaf2f0 a2=0 a3=7fffaeaaf2dc items=0 ppid=2115 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:36:31.025000 audit[2245]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.025000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe37f26f60 a2=0 a3=7ffe37f26f4c items=0 ppid=2115 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:36:31.026000 audit[2246]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.026000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6bed5720 a2=0 a3=7fff6bed570c items=0 ppid=2115 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:36:31.028000 audit[2248]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.028000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdd15a30b0 a2=0 a3=7ffdd15a309c items=0 ppid=2115 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:36:31.029000 audit[2249]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.029000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5f054f20 a2=0 a3=7ffe5f054f0c items=0 ppid=2115 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:36:31.032000 audit[2251]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.032000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe367f4770 a2=0 a3=7ffe367f475c items=0 ppid=2115 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:31.035000 audit[2254]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:31.035000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbc54cf90 a2=0 a3=7ffdbc54cf7c items=0 ppid=2115 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:31.037000 audit[2256]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:36:31.037000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe6cf88110 a2=0 a3=7ffe6cf880fc items=0 ppid=2115 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.037000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:31.038000 audit[2256]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:36:31.038000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe6cf88110 a2=0 a3=7ffe6cf880fc items=0 ppid=2115 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:31.038000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:31.210728 kubelet[1973]: E1213 14:36:31.210595 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:31.296695 kubelet[1973]: E1213 14:36:31.293564 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qs9pw" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" Dec 13 14:36:31.319850 kubelet[1973]: I1213 14:36:31.319817 1973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-ltthc" podStartSLOduration=4.505271989 podStartE2EDuration="6.319778724s" podCreationTimestamp="2024-12-13 14:36:25 +0000 UTC" firstStartedPulling="2024-12-13 14:36:28.539302447 +0000 UTC m=+4.243370108" lastFinishedPulling="2024-12-13 14:36:30.353809282 +0000 UTC m=+6.057876843" observedRunningTime="2024-12-13 14:36:31.31958412 +0000 UTC m=+7.023651681" watchObservedRunningTime="2024-12-13 14:36:31.319778724 +0000 UTC m=+7.023846385" Dec 13 14:36:31.366683 kubelet[1973]: E1213 14:36:31.366631 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.366683 kubelet[1973]: W1213 14:36:31.366672 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.366951 kubelet[1973]: E1213 14:36:31.366697 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.366951 kubelet[1973]: E1213 14:36:31.366922 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.366951 kubelet[1973]: W1213 14:36:31.366934 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.367102 kubelet[1973]: E1213 14:36:31.366955 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.367153 kubelet[1973]: E1213 14:36:31.367132 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.367153 kubelet[1973]: W1213 14:36:31.367141 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.367261 kubelet[1973]: E1213 14:36:31.367155 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.367344 kubelet[1973]: E1213 14:36:31.367323 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.367344 kubelet[1973]: W1213 14:36:31.367338 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.367472 kubelet[1973]: E1213 14:36:31.367353 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.367560 kubelet[1973]: E1213 14:36:31.367546 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.367560 kubelet[1973]: W1213 14:36:31.367557 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.367707 kubelet[1973]: E1213 14:36:31.367575 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.367772 kubelet[1973]: E1213 14:36:31.367754 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.367772 kubelet[1973]: W1213 14:36:31.367770 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.367883 kubelet[1973]: E1213 14:36:31.367788 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.367972 kubelet[1973]: E1213 14:36:31.367955 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.367972 kubelet[1973]: W1213 14:36:31.367967 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.368095 kubelet[1973]: E1213 14:36:31.367982 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.368164 kubelet[1973]: E1213 14:36:31.368146 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.368164 kubelet[1973]: W1213 14:36:31.368162 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.368262 kubelet[1973]: E1213 14:36:31.368179 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.368367 kubelet[1973]: E1213 14:36:31.368354 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.368367 kubelet[1973]: W1213 14:36:31.368365 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.368491 kubelet[1973]: E1213 14:36:31.368379 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.368552 kubelet[1973]: E1213 14:36:31.368539 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.368552 kubelet[1973]: W1213 14:36:31.368550 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.368682 kubelet[1973]: E1213 14:36:31.368565 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.368756 kubelet[1973]: E1213 14:36:31.368738 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.368756 kubelet[1973]: W1213 14:36:31.368753 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.368877 kubelet[1973]: E1213 14:36:31.368768 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.368939 kubelet[1973]: E1213 14:36:31.368929 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.368987 kubelet[1973]: W1213 14:36:31.368940 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.368987 kubelet[1973]: E1213 14:36:31.368955 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.369149 kubelet[1973]: E1213 14:36:31.369132 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.369149 kubelet[1973]: W1213 14:36:31.369144 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.369281 kubelet[1973]: E1213 14:36:31.369159 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.369329 kubelet[1973]: E1213 14:36:31.369322 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.369371 kubelet[1973]: W1213 14:36:31.369331 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.369371 kubelet[1973]: E1213 14:36:31.369345 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.369512 kubelet[1973]: E1213 14:36:31.369494 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.369512 kubelet[1973]: W1213 14:36:31.369506 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.369654 kubelet[1973]: E1213 14:36:31.369521 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.369714 kubelet[1973]: E1213 14:36:31.369704 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.369757 kubelet[1973]: W1213 14:36:31.369715 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.369757 kubelet[1973]: E1213 14:36:31.369730 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.369909 kubelet[1973]: E1213 14:36:31.369892 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.369909 kubelet[1973]: W1213 14:36:31.369905 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.370034 kubelet[1973]: E1213 14:36:31.369922 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.370090 kubelet[1973]: E1213 14:36:31.370078 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.370090 kubelet[1973]: W1213 14:36:31.370089 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.370203 kubelet[1973]: E1213 14:36:31.370104 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.370274 kubelet[1973]: E1213 14:36:31.370258 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.370274 kubelet[1973]: W1213 14:36:31.370271 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.370394 kubelet[1973]: E1213 14:36:31.370286 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.370453 kubelet[1973]: E1213 14:36:31.370440 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.370453 kubelet[1973]: W1213 14:36:31.370451 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.370543 kubelet[1973]: E1213 14:36:31.370467 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.385315 kubelet[1973]: E1213 14:36:31.385295 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.385315 kubelet[1973]: W1213 14:36:31.385309 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.385488 kubelet[1973]: E1213 14:36:31.385335 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.385625 kubelet[1973]: E1213 14:36:31.385610 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.385711 kubelet[1973]: W1213 14:36:31.385666 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.385711 kubelet[1973]: E1213 14:36:31.385701 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.385950 kubelet[1973]: E1213 14:36:31.385934 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.385950 kubelet[1973]: W1213 14:36:31.385947 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.386061 kubelet[1973]: E1213 14:36:31.385968 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.386207 kubelet[1973]: E1213 14:36:31.386192 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.386207 kubelet[1973]: W1213 14:36:31.386204 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.386334 kubelet[1973]: E1213 14:36:31.386225 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.386444 kubelet[1973]: E1213 14:36:31.386429 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.386444 kubelet[1973]: W1213 14:36:31.386441 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.386554 kubelet[1973]: E1213 14:36:31.386461 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.386713 kubelet[1973]: E1213 14:36:31.386698 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.386713 kubelet[1973]: W1213 14:36:31.386709 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.386826 kubelet[1973]: E1213 14:36:31.386809 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.387105 kubelet[1973]: E1213 14:36:31.387089 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.387105 kubelet[1973]: W1213 14:36:31.387101 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.387238 kubelet[1973]: E1213 14:36:31.387121 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.387321 kubelet[1973]: E1213 14:36:31.387303 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.387321 kubelet[1973]: W1213 14:36:31.387317 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.387421 kubelet[1973]: E1213 14:36:31.387337 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.387534 kubelet[1973]: E1213 14:36:31.387521 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.387534 kubelet[1973]: W1213 14:36:31.387532 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.387665 kubelet[1973]: E1213 14:36:31.387550 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.387801 kubelet[1973]: E1213 14:36:31.387786 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.387801 kubelet[1973]: W1213 14:36:31.387797 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.387907 kubelet[1973]: E1213 14:36:31.387817 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.388159 kubelet[1973]: E1213 14:36:31.388143 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.388159 kubelet[1973]: W1213 14:36:31.388157 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.388349 kubelet[1973]: E1213 14:36:31.388309 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.388349 kubelet[1973]: E1213 14:36:31.388320 1973 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:31.388349 kubelet[1973]: W1213 14:36:31.388328 1973 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:31.388349 kubelet[1973]: E1213 14:36:31.388342 1973 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:31.855599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2706670279.mount: Deactivated successfully. Dec 13 14:36:32.013278 env[1407]: time="2024-12-13T14:36:32.013219342Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:32.018162 env[1407]: time="2024-12-13T14:36:32.018118626Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:32.020923 env[1407]: time="2024-12-13T14:36:32.020887074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:32.023679 env[1407]: time="2024-12-13T14:36:32.023632421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:32.024150 env[1407]: time="2024-12-13T14:36:32.024117529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:36:32.026248 env[1407]: time="2024-12-13T14:36:32.026220365Z" level=info msg="CreateContainer within sandbox \"74435d140deaf3aa5570299b0b18ed1f7b8a8b38788fdcb9c97562e7efb43ff2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:36:32.057828 env[1407]: time="2024-12-13T14:36:32.057782107Z" level=info msg="CreateContainer within sandbox \"74435d140deaf3aa5570299b0b18ed1f7b8a8b38788fdcb9c97562e7efb43ff2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"217a21116c2e7041d00f7a8942aa7ad77a1f86303d8549103bad6ac3b3d3de9b\"" Dec 13 14:36:32.058518 env[1407]: time="2024-12-13T14:36:32.058481319Z" level=info msg="StartContainer for \"217a21116c2e7041d00f7a8942aa7ad77a1f86303d8549103bad6ac3b3d3de9b\"" Dec 13 14:36:32.077788 systemd[1]: Started cri-containerd-217a21116c2e7041d00f7a8942aa7ad77a1f86303d8549103bad6ac3b3d3de9b.scope. Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe0dc8d4b48 items=0 ppid=2039 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:32.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376132313131366332653730343164303066376138393432616137 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit: BPF prog-id=73 op=LOAD Dec 13 14:36:32.092000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a2208 items=0 ppid=2039 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:32.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376132313131366332653730343164303066376138393432616137 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.092000 audit: BPF prog-id=74 op=LOAD Dec 13 14:36:32.092000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a2258 items=0 ppid=2039 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:32.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376132313131366332653730343164303066376138393432616137 Dec 13 14:36:32.092000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:36:32.093000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:32.093000 audit: BPF prog-id=75 op=LOAD Dec 13 14:36:32.093000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a22e8 items=0 ppid=2039 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:32.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376132313131366332653730343164303066376138393432616137 Dec 13 14:36:32.114990 env[1407]: time="2024-12-13T14:36:32.109808600Z" level=info msg="StartContainer for \"217a21116c2e7041d00f7a8942aa7ad77a1f86303d8549103bad6ac3b3d3de9b\" returns successfully" Dec 13 14:36:32.118314 systemd[1]: cri-containerd-217a21116c2e7041d00f7a8942aa7ad77a1f86303d8549103bad6ac3b3d3de9b.scope: Deactivated successfully. Dec 13 14:36:32.121000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:36:32.211119 kubelet[1973]: E1213 14:36:32.211067 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:32.381312 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-217a21116c2e7041d00f7a8942aa7ad77a1f86303d8549103bad6ac3b3d3de9b-rootfs.mount: Deactivated successfully. Dec 13 14:36:33.026691 env[1407]: time="2024-12-13T14:36:33.026593021Z" level=info msg="shim disconnected" id=217a21116c2e7041d00f7a8942aa7ad77a1f86303d8549103bad6ac3b3d3de9b Dec 13 14:36:33.027231 env[1407]: time="2024-12-13T14:36:33.026686823Z" level=warning msg="cleaning up after shim disconnected" id=217a21116c2e7041d00f7a8942aa7ad77a1f86303d8549103bad6ac3b3d3de9b namespace=k8s.io Dec 13 14:36:33.027231 env[1407]: time="2024-12-13T14:36:33.026718023Z" level=info msg="cleaning up dead shim" Dec 13 14:36:33.036228 env[1407]: time="2024-12-13T14:36:33.036190481Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:36:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2340 runtime=io.containerd.runc.v2\n" Dec 13 14:36:33.211907 kubelet[1973]: E1213 14:36:33.211800 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:33.293808 kubelet[1973]: E1213 14:36:33.293676 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qs9pw" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" Dec 13 14:36:33.315464 env[1407]: time="2024-12-13T14:36:33.315419647Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:36:34.212960 kubelet[1973]: E1213 14:36:34.212912 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:35.213100 kubelet[1973]: E1213 14:36:35.213058 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:35.293142 kubelet[1973]: E1213 14:36:35.292750 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qs9pw" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" Dec 13 14:36:36.213512 kubelet[1973]: E1213 14:36:36.213468 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:37.214451 kubelet[1973]: E1213 14:36:37.214395 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:37.293666 kubelet[1973]: E1213 14:36:37.293550 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qs9pw" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" Dec 13 14:36:38.214599 kubelet[1973]: E1213 14:36:38.214519 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:39.215554 kubelet[1973]: E1213 14:36:39.215503 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:39.248845 env[1407]: time="2024-12-13T14:36:39.248789156Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:39.253339 env[1407]: time="2024-12-13T14:36:39.253304021Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:39.256041 env[1407]: time="2024-12-13T14:36:39.256011559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:39.259330 env[1407]: time="2024-12-13T14:36:39.259300006Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:39.259712 env[1407]: time="2024-12-13T14:36:39.259683712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:36:39.261781 env[1407]: time="2024-12-13T14:36:39.261751241Z" level=info msg="CreateContainer within sandbox \"74435d140deaf3aa5570299b0b18ed1f7b8a8b38788fdcb9c97562e7efb43ff2\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:36:39.290500 env[1407]: time="2024-12-13T14:36:39.290452851Z" level=info msg="CreateContainer within sandbox \"74435d140deaf3aa5570299b0b18ed1f7b8a8b38788fdcb9c97562e7efb43ff2\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7715b1aea5c91315e3bf12beeb479ed71cc1241e4b31c3c9973888d0ba9056c5\"" Dec 13 14:36:39.291150 env[1407]: time="2024-12-13T14:36:39.291117960Z" level=info msg="StartContainer for \"7715b1aea5c91315e3bf12beeb479ed71cc1241e4b31c3c9973888d0ba9056c5\"" Dec 13 14:36:39.292739 kubelet[1973]: E1213 14:36:39.292715 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qs9pw" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" Dec 13 14:36:39.314349 systemd[1]: Started cri-containerd-7715b1aea5c91315e3bf12beeb479ed71cc1241e4b31c3c9973888d0ba9056c5.scope. Dec 13 14:36:39.335000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.341718 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:36:39.341839 kernel: audit: type=1400 audit(1734100599.335:512): avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.335000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f090ecac018 items=0 ppid=2039 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:39.375357 kernel: audit: type=1300 audit(1734100599.335:512): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f090ecac018 items=0 ppid=2039 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:39.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737313562316165613563393133313565336266313262656562343739 Dec 13 14:36:39.392920 kernel: audit: type=1327 audit(1734100599.335:512): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737313562316165613563393133313565336266313262656562343739 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.407703 kernel: audit: type=1400 audit(1734100599.339:513): avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.407805 kernel: audit: type=1400 audit(1734100599.339:513): avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.432019 kernel: audit: type=1400 audit(1734100599.339:513): avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.432142 kernel: audit: type=1400 audit(1734100599.339:513): avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.444262 env[1407]: time="2024-12-13T14:36:39.444229345Z" level=info msg="StartContainer for \"7715b1aea5c91315e3bf12beeb479ed71cc1241e4b31c3c9973888d0ba9056c5\" returns successfully" Dec 13 14:36:39.457616 kernel: audit: type=1400 audit(1734100599.339:513): avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.469431 kernel: audit: type=1400 audit(1734100599.339:513): avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.469511 kernel: audit: type=1400 audit(1734100599.339:513): avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.339000 audit: BPF prog-id=76 op=LOAD Dec 13 14:36:39.339000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001e6768 items=0 ppid=2039 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:39.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737313562316165613563393133313565336266313262656562343739 Dec 13 14:36:39.354000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.354000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.354000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.354000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.354000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.354000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.354000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.354000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.354000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.354000 audit: BPF prog-id=77 op=LOAD Dec 13 14:36:39.354000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001e67b8 items=0 ppid=2039 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:39.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737313562316165613563393133313565336266313262656562343739 Dec 13 14:36:39.374000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:36:39.374000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:39.374000 audit: BPF prog-id=78 op=LOAD Dec 13 14:36:39.374000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001e6848 items=0 ppid=2039 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:39.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737313562316165613563393133313565336266313262656562343739 Dec 13 14:36:40.215946 kubelet[1973]: E1213 14:36:40.215835 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:40.844113 env[1407]: time="2024-12-13T14:36:40.844032914Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:36:40.846076 systemd[1]: cri-containerd-7715b1aea5c91315e3bf12beeb479ed71cc1241e4b31c3c9973888d0ba9056c5.scope: Deactivated successfully. Dec 13 14:36:40.849000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:36:40.854209 kubelet[1973]: I1213 14:36:40.853134 1973 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:36:40.867336 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7715b1aea5c91315e3bf12beeb479ed71cc1241e4b31c3c9973888d0ba9056c5-rootfs.mount: Deactivated successfully. Dec 13 14:36:41.433193 kubelet[1973]: E1213 14:36:41.216702 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:41.433775 env[1407]: time="2024-12-13T14:36:41.432160452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qs9pw,Uid:e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e,Namespace:calico-system,Attempt:0,}" Dec 13 14:36:41.299996 systemd[1]: Created slice kubepods-besteffort-pode64ac9c2_41c4_4eda_bd57_2e9a8c0dc98e.slice. Dec 13 14:36:42.217522 kubelet[1973]: E1213 14:36:42.217462 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:42.544171 env[1407]: time="2024-12-13T14:36:42.544037945Z" level=info msg="shim disconnected" id=7715b1aea5c91315e3bf12beeb479ed71cc1241e4b31c3c9973888d0ba9056c5 Dec 13 14:36:42.544171 env[1407]: time="2024-12-13T14:36:42.544092346Z" level=warning msg="cleaning up after shim disconnected" id=7715b1aea5c91315e3bf12beeb479ed71cc1241e4b31c3c9973888d0ba9056c5 namespace=k8s.io Dec 13 14:36:42.544171 env[1407]: time="2024-12-13T14:36:42.544104746Z" level=info msg="cleaning up dead shim" Dec 13 14:36:42.552589 env[1407]: time="2024-12-13T14:36:42.552544157Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:36:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2400 runtime=io.containerd.runc.v2\n" Dec 13 14:36:42.614780 env[1407]: time="2024-12-13T14:36:42.614711579Z" level=error msg="Failed to destroy network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:42.618351 env[1407]: time="2024-12-13T14:36:42.615527790Z" level=error msg="encountered an error cleaning up failed sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:42.618351 env[1407]: time="2024-12-13T14:36:42.615606991Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qs9pw,Uid:e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:42.618470 kubelet[1973]: E1213 14:36:42.618257 1973 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:42.618470 kubelet[1973]: E1213 14:36:42.618342 1973 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qs9pw" Dec 13 14:36:42.618470 kubelet[1973]: E1213 14:36:42.618383 1973 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qs9pw" Dec 13 14:36:42.616539 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511-shm.mount: Deactivated successfully. Dec 13 14:36:42.619056 kubelet[1973]: E1213 14:36:42.618769 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qs9pw_calico-system(e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qs9pw_calico-system(e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qs9pw" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" Dec 13 14:36:43.217904 kubelet[1973]: E1213 14:36:43.217840 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:43.341813 env[1407]: time="2024-12-13T14:36:43.341626283Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:36:43.342179 kubelet[1973]: I1213 14:36:43.342153 1973 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:36:43.342676 env[1407]: time="2024-12-13T14:36:43.342633496Z" level=info msg="StopPodSandbox for \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\"" Dec 13 14:36:43.370170 env[1407]: time="2024-12-13T14:36:43.370111750Z" level=error msg="StopPodSandbox for \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\" failed" error="failed to destroy network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:43.370364 kubelet[1973]: E1213 14:36:43.370344 1973 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:36:43.370430 kubelet[1973]: E1213 14:36:43.370424 1973 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511"} Dec 13 14:36:43.370504 kubelet[1973]: E1213 14:36:43.370475 1973 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:36:43.370599 kubelet[1973]: E1213 14:36:43.370517 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qs9pw" podUID="e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e" Dec 13 14:36:44.218364 kubelet[1973]: E1213 14:36:44.218298 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:45.202589 kubelet[1973]: E1213 14:36:45.202545 1973 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:45.218789 kubelet[1973]: E1213 14:36:45.218729 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:46.219416 kubelet[1973]: E1213 14:36:46.219370 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:47.220430 kubelet[1973]: E1213 14:36:47.220369 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:47.880199 kubelet[1973]: I1213 14:36:47.880152 1973 topology_manager.go:215] "Topology Admit Handler" podUID="4fc68419-02e2-4724-a354-3ca5b4c208ed" podNamespace="default" podName="nginx-deployment-6d5f899847-brfsk" Dec 13 14:36:47.885262 systemd[1]: Created slice kubepods-besteffort-pod4fc68419_02e2_4724_a354_3ca5b4c208ed.slice. Dec 13 14:36:47.997974 kubelet[1973]: I1213 14:36:47.997921 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9bwwb\" (UniqueName: \"kubernetes.io/projected/4fc68419-02e2-4724-a354-3ca5b4c208ed-kube-api-access-9bwwb\") pod \"nginx-deployment-6d5f899847-brfsk\" (UID: \"4fc68419-02e2-4724-a354-3ca5b4c208ed\") " pod="default/nginx-deployment-6d5f899847-brfsk" Dec 13 14:36:48.188668 env[1407]: time="2024-12-13T14:36:48.188512154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-brfsk,Uid:4fc68419-02e2-4724-a354-3ca5b4c208ed,Namespace:default,Attempt:0,}" Dec 13 14:36:48.221144 kubelet[1973]: E1213 14:36:48.221083 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:48.377355 env[1407]: time="2024-12-13T14:36:48.377283703Z" level=error msg="Failed to destroy network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:48.382138 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9-shm.mount: Deactivated successfully. Dec 13 14:36:48.383297 env[1407]: time="2024-12-13T14:36:48.383240670Z" level=error msg="encountered an error cleaning up failed sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:48.383410 env[1407]: time="2024-12-13T14:36:48.383325571Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-brfsk,Uid:4fc68419-02e2-4724-a354-3ca5b4c208ed,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:48.384038 kubelet[1973]: E1213 14:36:48.383577 1973 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:48.384038 kubelet[1973]: E1213 14:36:48.383655 1973 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-brfsk" Dec 13 14:36:48.384038 kubelet[1973]: E1213 14:36:48.383682 1973 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-brfsk" Dec 13 14:36:48.384288 kubelet[1973]: E1213 14:36:48.383756 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-brfsk_default(4fc68419-02e2-4724-a354-3ca5b4c208ed)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-brfsk_default(4fc68419-02e2-4724-a354-3ca5b4c208ed)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-brfsk" podUID="4fc68419-02e2-4724-a354-3ca5b4c208ed" Dec 13 14:36:49.221504 kubelet[1973]: E1213 14:36:49.221404 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:49.355822 kubelet[1973]: I1213 14:36:49.355092 1973 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:36:49.356228 env[1407]: time="2024-12-13T14:36:49.356188249Z" level=info msg="StopPodSandbox for \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\"" Dec 13 14:36:49.393193 env[1407]: time="2024-12-13T14:36:49.393125859Z" level=error msg="StopPodSandbox for \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\" failed" error="failed to destroy network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:36:49.393414 kubelet[1973]: E1213 14:36:49.393390 1973 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:36:49.393511 kubelet[1973]: E1213 14:36:49.393444 1973 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9"} Dec 13 14:36:49.393511 kubelet[1973]: E1213 14:36:49.393495 1973 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4fc68419-02e2-4724-a354-3ca5b4c208ed\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:36:49.393661 kubelet[1973]: E1213 14:36:49.393533 1973 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4fc68419-02e2-4724-a354-3ca5b4c208ed\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-brfsk" podUID="4fc68419-02e2-4724-a354-3ca5b4c208ed" Dec 13 14:36:50.222594 kubelet[1973]: E1213 14:36:50.222548 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:51.222981 kubelet[1973]: E1213 14:36:51.222907 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:51.889419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount159770759.mount: Deactivated successfully. Dec 13 14:36:51.930221 env[1407]: time="2024-12-13T14:36:51.930169199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:51.935861 env[1407]: time="2024-12-13T14:36:51.935820558Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:51.939210 env[1407]: time="2024-12-13T14:36:51.939175294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:51.943227 env[1407]: time="2024-12-13T14:36:51.943194336Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:51.943550 env[1407]: time="2024-12-13T14:36:51.943521740Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:36:51.959422 env[1407]: time="2024-12-13T14:36:51.959389808Z" level=info msg="CreateContainer within sandbox \"74435d140deaf3aa5570299b0b18ed1f7b8a8b38788fdcb9c97562e7efb43ff2\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:36:51.990014 env[1407]: time="2024-12-13T14:36:51.989972432Z" level=info msg="CreateContainer within sandbox \"74435d140deaf3aa5570299b0b18ed1f7b8a8b38788fdcb9c97562e7efb43ff2\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"74c48418d261a40911472e55c110a340ab8a593948464d15dd04e68040c45cb8\"" Dec 13 14:36:51.990725 env[1407]: time="2024-12-13T14:36:51.990666239Z" level=info msg="StartContainer for \"74c48418d261a40911472e55c110a340ab8a593948464d15dd04e68040c45cb8\"" Dec 13 14:36:52.009362 systemd[1]: Started cri-containerd-74c48418d261a40911472e55c110a340ab8a593948464d15dd04e68040c45cb8.scope. Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.030929 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:36:52.031018 kernel: audit: type=1400 audit(1734100612.025:519): avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdccf1e1c28 items=0 ppid=2039 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:52.064420 kernel: audit: type=1300 audit(1734100612.025:519): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdccf1e1c28 items=0 ppid=2039 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:52.083441 kernel: audit: type=1327 audit(1734100612.025:519): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734633438343138643236316134303931313437326535356331313061 Dec 13 14:36:52.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734633438343138643236316134303931313437326535356331313061 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.097060 env[1407]: time="2024-12-13T14:36:52.097012242Z" level=info msg="StartContainer for \"74c48418d261a40911472e55c110a340ab8a593948464d15dd04e68040c45cb8\" returns successfully" Dec 13 14:36:52.111340 kernel: audit: type=1400 audit(1734100612.025:520): avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.111454 kernel: audit: type=1400 audit(1734100612.025:520): avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.137814 kernel: audit: type=1400 audit(1734100612.025:520): avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.137907 kernel: audit: type=1400 audit(1734100612.025:520): avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.137938 kernel: audit: type=1400 audit(1734100612.025:520): avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.164010 kernel: audit: type=1400 audit(1734100612.025:520): avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.177709 kernel: audit: type=1400 audit(1734100612.025:520): avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit: BPF prog-id=79 op=LOAD Dec 13 14:36:52.025000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b7af8 items=0 ppid=2039 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:52.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734633438343138643236316134303931313437326535356331313061 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.025000 audit: BPF prog-id=80 op=LOAD Dec 13 14:36:52.025000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b7b48 items=0 ppid=2039 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:52.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734633438343138643236316134303931313437326535356331313061 Dec 13 14:36:52.026000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:36:52.026000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:52.026000 audit: BPF prog-id=81 op=LOAD Dec 13 14:36:52.026000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b7bd8 items=0 ppid=2039 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:52.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734633438343138643236316134303931313437326535356331313061 Dec 13 14:36:52.223415 kubelet[1973]: E1213 14:36:52.223369 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:52.385275 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:36:52.385430 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:36:53.224118 kubelet[1973]: E1213 14:36:53.224062 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:53.384393 systemd[1]: run-containerd-runc-k8s.io-74c48418d261a40911472e55c110a340ab8a593948464d15dd04e68040c45cb8-runc.CXsvTR.mount: Deactivated successfully. Dec 13 14:36:53.698000 audit[2670]: AVC avc: denied { write } for pid=2670 comm="tee" name="fd" dev="proc" ino=23334 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:36:53.700000 audit[2672]: AVC avc: denied { write } for pid=2672 comm="tee" name="fd" dev="proc" ino=23338 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:36:53.704000 audit[2675]: AVC avc: denied { write } for pid=2675 comm="tee" name="fd" dev="proc" ino=23870 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:36:53.704000 audit[2675]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9edb1a05 a2=241 a3=1b6 items=1 ppid=2648 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.706000 audit[2691]: AVC avc: denied { write } for pid=2691 comm="tee" name="fd" dev="proc" ino=23874 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:36:53.700000 audit[2672]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff15019a15 a2=241 a3=1b6 items=1 ppid=2638 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.700000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:36:53.700000 audit: PATH item=0 name="/dev/fd/63" inode=23328 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:36:53.700000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:36:53.698000 audit[2670]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5c5dca16 a2=241 a3=1b6 items=1 ppid=2642 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.698000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:36:53.698000 audit: PATH item=0 name="/dev/fd/63" inode=23858 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:36:53.698000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:36:53.710000 audit[2689]: AVC avc: denied { write } for pid=2689 comm="tee" name="fd" dev="proc" ino=23345 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:36:53.710000 audit[2680]: AVC avc: denied { write } for pid=2680 comm="tee" name="fd" dev="proc" ino=23348 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:36:53.711000 audit[2677]: AVC avc: denied { write } for pid=2677 comm="tee" name="fd" dev="proc" ino=23351 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:36:53.704000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:36:53.704000 audit: PATH item=0 name="/dev/fd/63" inode=23859 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:36:53.704000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:36:53.711000 audit[2677]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7ad25a06 a2=241 a3=1b6 items=1 ppid=2644 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.711000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:36:53.711000 audit: PATH item=0 name="/dev/fd/63" inode=23331 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:36:53.706000 audit[2691]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdda41ca17 a2=241 a3=1b6 items=1 ppid=2650 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.706000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:36:53.706000 audit: PATH item=0 name="/dev/fd/63" inode=23867 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:36:53.706000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:36:53.711000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:36:53.710000 audit[2680]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe06739a15 a2=241 a3=1b6 items=1 ppid=2646 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.710000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:36:53.710000 audit: PATH item=0 name="/dev/fd/63" inode=23862 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:36:53.710000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:36:53.710000 audit[2689]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff8cd5a15 a2=241 a3=1b6 items=1 ppid=2640 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.710000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:36:53.710000 audit: PATH item=0 name="/dev/fd/63" inode=23335 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:36:53.710000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit: BPF prog-id=82 op=LOAD Dec 13 14:36:53.898000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff91617530 a2=98 a3=3 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:53.898000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit: BPF prog-id=83 op=LOAD Dec 13 14:36:53.898000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff91617310 a2=74 a3=540051 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:53.898000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.898000 audit: BPF prog-id=84 op=LOAD Dec 13 14:36:53.898000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff91617340 a2=94 a3=2 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:53.898000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit: BPF prog-id=85 op=LOAD Dec 13 14:36:54.009000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff91617200 a2=40 a3=1 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.009000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.009000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:36:54.009000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.009000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff916172d0 a2=50 a3=7fff916173b0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.009000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff91617210 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff91617240 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff91617150 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff91617260 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff91617240 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff91617230 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff91617260 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff91617240 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff91617260 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff91617230 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff916172a0 a2=28 a3=0 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff91617050 a2=50 a3=1 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit: BPF prog-id=86 op=LOAD Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff91617050 a2=94 a3=5 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff91617100 a2=50 a3=1 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff91617220 a2=4 a3=38 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.020000 audit[2748]: AVC avc: denied { confidentiality } for pid=2748 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:36:54.020000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff91617270 a2=94 a3=6 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { confidentiality } for pid=2748 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:36:54.021000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff91616a20 a2=94 a3=83 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.021000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.021000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff91616a20 a2=94 a3=83 items=0 ppid=2639 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.021000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:36:54.029000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.029000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.029000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.029000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.029000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.029000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.029000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.029000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.029000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.029000 audit: BPF prog-id=87 op=LOAD Dec 13 14:36:54.029000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb1b3c9a0 a2=98 a3=1999999999999999 items=0 ppid=2639 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.029000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:36:54.030000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit: BPF prog-id=88 op=LOAD Dec 13 14:36:54.030000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb1b3c880 a2=74 a3=ffff items=0 ppid=2639 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.030000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:36:54.030000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.030000 audit: BPF prog-id=89 op=LOAD Dec 13 14:36:54.030000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb1b3c8c0 a2=40 a3=7ffdb1b3caa0 items=0 ppid=2639 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.030000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:36:54.030000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:36:54.145415 systemd-networkd[1561]: vxlan.calico: Link UP Dec 13 14:36:54.145424 systemd-networkd[1561]: vxlan.calico: Gained carrier Dec 13 14:36:54.168000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.168000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.168000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.168000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.168000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.168000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.168000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.168000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.168000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.168000 audit: BPF prog-id=90 op=LOAD Dec 13 14:36:54.168000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef89fded0 a2=98 a3=ffffffff items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit: BPF prog-id=91 op=LOAD Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef89fdce0 a2=74 a3=540051 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit: BPF prog-id=92 op=LOAD Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef89fdd10 a2=94 a3=2 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef89fdbe0 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef89fdc10 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef89fdb20 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef89fdc30 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef89fdc10 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef89fdc00 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef89fdc30 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef89fdc10 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef89fdc30 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef89fdc00 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef89fdc70 a2=28 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.173000 audit: BPF prog-id=93 op=LOAD Dec 13 14:36:54.173000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef89fdae0 a2=40 a3=0 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.174000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffef89fdad0 a2=50 a3=2800 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffef89fdad0 a2=50 a3=2800 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit: BPF prog-id=94 op=LOAD Dec 13 14:36:54.174000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef89fd2f0 a2=94 a3=2 items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.174000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.174000 audit: BPF prog-id=95 op=LOAD Dec 13 14:36:54.174000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef89fd3f0 a2=94 a3=2d items=0 ppid=2639 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:36:54.181000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.181000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.181000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.181000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.181000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.181000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.181000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.181000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.181000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.181000 audit: BPF prog-id=96 op=LOAD Dec 13 14:36:54.181000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd6e74710 a2=98 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.182000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit: BPF prog-id=97 op=LOAD Dec 13 14:36:54.182000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd6e744f0 a2=74 a3=540051 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.182000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.182000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.182000 audit: BPF prog-id=98 op=LOAD Dec 13 14:36:54.182000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd6e74520 a2=94 a3=2 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.182000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.182000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:36:54.224476 kubelet[1973]: E1213 14:36:54.224414 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit: BPF prog-id=99 op=LOAD Dec 13 14:36:54.299000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd6e743e0 a2=40 a3=1 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.299000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.299000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:36:54.299000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.299000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffd6e744b0 a2=50 a3=7fffd6e74590 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.299000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6e743f0 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6e74420 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6e74330 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6e74440 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6e74420 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6e74410 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6e74440 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6e74420 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6e74440 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6e74410 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6e74480 a2=28 a3=0 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd6e74230 a2=50 a3=1 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit: BPF prog-id=100 op=LOAD Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd6e74230 a2=94 a3=5 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd6e742e0 a2=50 a3=1 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffd6e74400 a2=4 a3=38 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.312000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:36:54.312000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd6e74450 a2=94 a3=6 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:36:54.313000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd6e73c00 a2=94 a3=83 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.313000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd6e73c00 a2=94 a3=83 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.313000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6e75640 a2=10 a3=f1f00800 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.313000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.313000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.313000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6e754e0 a2=10 a3=3 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.313000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.314000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.314000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6e75480 a2=10 a3=3 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.314000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.314000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.314000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6e75480 a2=10 a3=7 items=0 ppid=2639 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.314000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:36:54.320000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:36:54.497000 audit[2810]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:36:54.497000 audit[2810]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffff633aaa0 a2=0 a3=7ffff633aa8c items=0 ppid=2639 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.497000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:36:54.557000 audit[2807]: NETFILTER_CFG table=raw:69 family=2 entries=21 op=nft_register_chain pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:36:54.557000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc713f1630 a2=0 a3=7ffc713f161c items=0 ppid=2639 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.557000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:36:54.579000 audit[2806]: NETFILTER_CFG table=nat:70 family=2 entries=15 op=nft_register_chain pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:36:54.579000 audit[2806]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd261f3230 a2=0 a3=7ffd261f321c items=0 ppid=2639 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.579000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:36:54.580000 audit[2809]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:36:54.580000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdec5486c0 a2=0 a3=556be722b000 items=0 ppid=2639 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:36:55.224850 kubelet[1973]: E1213 14:36:55.224765 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:55.330222 systemd-networkd[1561]: vxlan.calico: Gained IPv6LL Dec 13 14:36:56.225559 kubelet[1973]: E1213 14:36:56.225512 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:57.226302 kubelet[1973]: E1213 14:36:57.226243 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:57.901207 kubelet[1973]: I1213 14:36:57.901169 1973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-rrtgv" podStartSLOduration=9.508736867 podStartE2EDuration="32.901128131s" podCreationTimestamp="2024-12-13 14:36:25 +0000 UTC" firstStartedPulling="2024-12-13 14:36:28.551412979 +0000 UTC m=+4.255480640" lastFinishedPulling="2024-12-13 14:36:51.943804243 +0000 UTC m=+27.647871904" observedRunningTime="2024-12-13 14:36:52.377657744 +0000 UTC m=+28.081725405" watchObservedRunningTime="2024-12-13 14:36:57.901128131 +0000 UTC m=+33.605195692" Dec 13 14:36:58.226758 kubelet[1973]: E1213 14:36:58.226602 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:58.294082 env[1407]: time="2024-12-13T14:36:58.294026591Z" level=info msg="StopPodSandbox for \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\"" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.346 [INFO][2858] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.346 [INFO][2858] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" iface="eth0" netns="/var/run/netns/cni-ceb2455c-73f5-488c-4ada-6b88d23b3abf" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.346 [INFO][2858] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" iface="eth0" netns="/var/run/netns/cni-ceb2455c-73f5-488c-4ada-6b88d23b3abf" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.347 [INFO][2858] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" iface="eth0" netns="/var/run/netns/cni-ceb2455c-73f5-488c-4ada-6b88d23b3abf" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.347 [INFO][2858] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.347 [INFO][2858] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.364 [INFO][2864] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" HandleID="k8s-pod-network.90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.364 [INFO][2864] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.364 [INFO][2864] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.373 [WARNING][2864] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" HandleID="k8s-pod-network.90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.373 [INFO][2864] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" HandleID="k8s-pod-network.90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.374 [INFO][2864] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:36:58.377685 env[1407]: 2024-12-13 14:36:58.376 [INFO][2858] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:36:58.378349 env[1407]: time="2024-12-13T14:36:58.378312850Z" level=info msg="TearDown network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\" successfully" Dec 13 14:36:58.378448 env[1407]: time="2024-12-13T14:36:58.378430551Z" level=info msg="StopPodSandbox for \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\" returns successfully" Dec 13 14:36:58.379201 env[1407]: time="2024-12-13T14:36:58.379164258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qs9pw,Uid:e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e,Namespace:calico-system,Attempt:1,}" Dec 13 14:36:58.380413 systemd[1]: run-netns-cni\x2dceb2455c\x2d73f5\x2d488c\x2d4ada\x2d6b88d23b3abf.mount: Deactivated successfully. Dec 13 14:36:58.539085 systemd-networkd[1561]: cali052d09fbc58: Link UP Dec 13 14:36:58.551755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:36:58.551867 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali052d09fbc58: link becomes ready Dec 13 14:36:58.552225 systemd-networkd[1561]: cali052d09fbc58: Gained carrier Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.477 [INFO][2870] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.10-k8s-csi--node--driver--qs9pw-eth0 csi-node-driver- calico-system e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e 1276 0 2024-12-13 14:36:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.8.10 csi-node-driver-qs9pw eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali052d09fbc58 [] []}} ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Namespace="calico-system" Pod="csi-node-driver-qs9pw" WorkloadEndpoint="10.200.8.10-k8s-csi--node--driver--qs9pw-" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.477 [INFO][2870] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Namespace="calico-system" Pod="csi-node-driver-qs9pw" WorkloadEndpoint="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.501 [INFO][2882] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" HandleID="k8s-pod-network.ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.512 [INFO][2882] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" HandleID="k8s-pod-network.ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290ae0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.10", "pod":"csi-node-driver-qs9pw", "timestamp":"2024-12-13 14:36:58.501429259 +0000 UTC"}, Hostname:"10.200.8.10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.512 [INFO][2882] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.512 [INFO][2882] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.512 [INFO][2882] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.10' Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.514 [INFO][2882] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" host="10.200.8.10" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.517 [INFO][2882] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.10" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.520 [INFO][2882] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="10.200.8.10" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.522 [INFO][2882] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="10.200.8.10" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.524 [INFO][2882] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="10.200.8.10" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.524 [INFO][2882] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" host="10.200.8.10" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.525 [INFO][2882] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6 Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.529 [INFO][2882] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" host="10.200.8.10" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.534 [INFO][2882] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.1/26] block=192.168.55.0/26 handle="k8s-pod-network.ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" host="10.200.8.10" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.534 [INFO][2882] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.1/26] handle="k8s-pod-network.ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" host="10.200.8.10" Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.534 [INFO][2882] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:36:58.566168 env[1407]: 2024-12-13 14:36:58.534 [INFO][2882] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.1/26] IPv6=[] ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" HandleID="k8s-pod-network.ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.567273 env[1407]: 2024-12-13 14:36:58.536 [INFO][2870] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Namespace="calico-system" Pod="csi-node-driver-qs9pw" WorkloadEndpoint="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-csi--node--driver--qs9pw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e", ResourceVersion:"1276", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"", Pod:"csi-node-driver-qs9pw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali052d09fbc58", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:36:58.567273 env[1407]: 2024-12-13 14:36:58.536 [INFO][2870] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.1/32] ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Namespace="calico-system" Pod="csi-node-driver-qs9pw" WorkloadEndpoint="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.567273 env[1407]: 2024-12-13 14:36:58.536 [INFO][2870] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali052d09fbc58 ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Namespace="calico-system" Pod="csi-node-driver-qs9pw" WorkloadEndpoint="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.567273 env[1407]: 2024-12-13 14:36:58.553 [INFO][2870] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Namespace="calico-system" Pod="csi-node-driver-qs9pw" WorkloadEndpoint="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.567273 env[1407]: 2024-12-13 14:36:58.553 [INFO][2870] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Namespace="calico-system" Pod="csi-node-driver-qs9pw" WorkloadEndpoint="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-csi--node--driver--qs9pw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e", ResourceVersion:"1276", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6", Pod:"csi-node-driver-qs9pw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali052d09fbc58", MAC:"ca:67:e0:90:11:3f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:36:58.567273 env[1407]: 2024-12-13 14:36:58.564 [INFO][2870] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6" Namespace="calico-system" Pod="csi-node-driver-qs9pw" WorkloadEndpoint="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:36:58.594753 kernel: kauditd_printk_skb: 560 callbacks suppressed Dec 13 14:36:58.594865 kernel: audit: type=1325 audit(1734100618.579:627): table=filter:72 family=2 entries=34 op=nft_register_chain pid=2905 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:36:58.579000 audit[2905]: NETFILTER_CFG table=filter:72 family=2 entries=34 op=nft_register_chain pid=2905 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:36:58.596678 kernel: audit: type=1300 audit(1734100618.579:627): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc83f5e250 a2=0 a3=7ffc83f5e23c items=0 ppid=2639 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.579000 audit[2905]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc83f5e250 a2=0 a3=7ffc83f5e23c items=0 ppid=2639 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.612077 env[1407]: time="2024-12-13T14:36:58.612016956Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:58.612260 env[1407]: time="2024-12-13T14:36:58.612223657Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:58.612364 env[1407]: time="2024-12-13T14:36:58.612343059Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:58.612600 env[1407]: time="2024-12-13T14:36:58.612568861Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6 pid=2912 runtime=io.containerd.runc.v2 Dec 13 14:36:58.579000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:36:58.632172 kernel: audit: type=1327 audit(1734100618.579:627): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:36:58.634601 systemd[1]: Started cri-containerd-ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6.scope. Dec 13 14:36:58.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676755 kernel: audit: type=1400 audit(1734100618.650:628): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676856 kernel: audit: type=1400 audit(1734100618.650:629): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689504 kernel: audit: type=1400 audit(1734100618.650:630): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.714311 env[1407]: time="2024-12-13T14:36:58.714272677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qs9pw,Uid:e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e,Namespace:calico-system,Attempt:1,} returns sandbox id \"ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6\"" Dec 13 14:36:58.716194 env[1407]: time="2024-12-13T14:36:58.716161594Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:36:58.719583 kernel: audit: type=1400 audit(1734100618.650:631): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.719722 kernel: audit: type=1400 audit(1734100618.650:632): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.744783 kernel: audit: type=1400 audit(1734100618.650:633): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.744860 kernel: audit: type=1400 audit(1734100618.650:634): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit: BPF prog-id=101 op=LOAD Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663361663730643635666335353266656666633964343863356161 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663361663730643635666335353266656666633964343863356161 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.676000 audit: BPF prog-id=102 op=LOAD Dec 13 14:36:58.676000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015d620 items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663361663730643635666335353266656666633964343863356161 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit: BPF prog-id=103 op=LOAD Dec 13 14:36:58.689000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015d668 items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663361663730643635666335353266656666633964343863356161 Dec 13 14:36:58.689000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:36:58.689000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:58.689000 audit: BPF prog-id=104 op=LOAD Dec 13 14:36:58.689000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015da78 items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663361663730643635666335353266656666633964343863356161 Dec 13 14:36:59.227545 kubelet[1973]: E1213 14:36:59.227475 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:59.809954 systemd-networkd[1561]: cali052d09fbc58: Gained IPv6LL Dec 13 14:37:00.077442 env[1407]: time="2024-12-13T14:37:00.077391329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:00.083056 env[1407]: time="2024-12-13T14:37:00.083014378Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:00.086815 env[1407]: time="2024-12-13T14:37:00.086779610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:00.090888 env[1407]: time="2024-12-13T14:37:00.090856345Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:00.091257 env[1407]: time="2024-12-13T14:37:00.091224348Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:37:00.093329 env[1407]: time="2024-12-13T14:37:00.093294466Z" level=info msg="CreateContainer within sandbox \"ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:37:00.147220 env[1407]: time="2024-12-13T14:37:00.147175231Z" level=info msg="CreateContainer within sandbox \"ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8c1412a1d104ac52b3fde3fa924b449703c5b2c35cdf19150a30e38f724a23c5\"" Dec 13 14:37:00.147792 env[1407]: time="2024-12-13T14:37:00.147763536Z" level=info msg="StartContainer for \"8c1412a1d104ac52b3fde3fa924b449703c5b2c35cdf19150a30e38f724a23c5\"" Dec 13 14:37:00.178511 systemd[1]: run-containerd-runc-k8s.io-8c1412a1d104ac52b3fde3fa924b449703c5b2c35cdf19150a30e38f724a23c5-runc.1C2wq2.mount: Deactivated successfully. Dec 13 14:37:00.182723 systemd[1]: Started cri-containerd-8c1412a1d104ac52b3fde3fa924b449703c5b2c35cdf19150a30e38f724a23c5.scope. Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f7c511b9098 items=0 ppid=2912 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313431326131643130346163353262336664653366613932346234 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit: BPF prog-id=105 op=LOAD Dec 13 14:37:00.196000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003c22f8 items=0 ppid=2912 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313431326131643130346163353262336664653366613932346234 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit: BPF prog-id=106 op=LOAD Dec 13 14:37:00.196000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003c2348 items=0 ppid=2912 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313431326131643130346163353262336664653366613932346234 Dec 13 14:37:00.196000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:37:00.196000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.196000 audit: BPF prog-id=107 op=LOAD Dec 13 14:37:00.196000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003c23d8 items=0 ppid=2912 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313431326131643130346163353262336664653366613932346234 Dec 13 14:37:00.216920 env[1407]: time="2024-12-13T14:37:00.216884531Z" level=info msg="StartContainer for \"8c1412a1d104ac52b3fde3fa924b449703c5b2c35cdf19150a30e38f724a23c5\" returns successfully" Dec 13 14:37:00.218284 env[1407]: time="2024-12-13T14:37:00.218253643Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:37:00.228120 kubelet[1973]: E1213 14:37:00.228080 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:00.293574 env[1407]: time="2024-12-13T14:37:00.293357090Z" level=info msg="StopPodSandbox for \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\"" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.336 [INFO][3002] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.336 [INFO][3002] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" iface="eth0" netns="/var/run/netns/cni-29c5a295-5c37-937e-a8a3-fd671e1a42f8" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.336 [INFO][3002] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" iface="eth0" netns="/var/run/netns/cni-29c5a295-5c37-937e-a8a3-fd671e1a42f8" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.337 [INFO][3002] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" iface="eth0" netns="/var/run/netns/cni-29c5a295-5c37-937e-a8a3-fd671e1a42f8" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.337 [INFO][3002] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.337 [INFO][3002] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.355 [INFO][3008] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" HandleID="k8s-pod-network.8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.355 [INFO][3008] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.355 [INFO][3008] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.362 [WARNING][3008] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" HandleID="k8s-pod-network.8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.362 [INFO][3008] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" HandleID="k8s-pod-network.8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.363 [INFO][3008] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:00.367426 env[1407]: 2024-12-13 14:37:00.364 [INFO][3002] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:00.367426 env[1407]: time="2024-12-13T14:37:00.366007816Z" level=info msg="TearDown network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\" successfully" Dec 13 14:37:00.367426 env[1407]: time="2024-12-13T14:37:00.366049017Z" level=info msg="StopPodSandbox for \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\" returns successfully" Dec 13 14:37:00.368130 env[1407]: time="2024-12-13T14:37:00.368098934Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-brfsk,Uid:4fc68419-02e2-4724-a354-3ca5b4c208ed,Namespace:default,Attempt:1,}" Dec 13 14:37:00.505906 systemd-networkd[1561]: cali336531ca815: Link UP Dec 13 14:37:00.509949 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:37:00.510046 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali336531ca815: link becomes ready Dec 13 14:37:00.510404 systemd-networkd[1561]: cali336531ca815: Gained carrier Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.433 [INFO][3015] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0 nginx-deployment-6d5f899847- default 4fc68419-02e2-4724-a354-3ca5b4c208ed 1294 0 2024-12-13 14:36:47 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.10 nginx-deployment-6d5f899847-brfsk eth0 default [] [] [kns.default ksa.default.default] cali336531ca815 [] []}} ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Namespace="default" Pod="nginx-deployment-6d5f899847-brfsk" WorkloadEndpoint="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.433 [INFO][3015] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Namespace="default" Pod="nginx-deployment-6d5f899847-brfsk" WorkloadEndpoint="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.458 [INFO][3027] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" HandleID="k8s-pod-network.1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.466 [INFO][3027] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" HandleID="k8s-pod-network.1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ec780), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.10", "pod":"nginx-deployment-6d5f899847-brfsk", "timestamp":"2024-12-13 14:37:00.458354512 +0000 UTC"}, Hostname:"10.200.8.10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.466 [INFO][3027] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.467 [INFO][3027] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.467 [INFO][3027] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.10' Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.468 [INFO][3027] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" host="10.200.8.10" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.473 [INFO][3027] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.10" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.476 [INFO][3027] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="10.200.8.10" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.478 [INFO][3027] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="10.200.8.10" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.480 [INFO][3027] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="10.200.8.10" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.480 [INFO][3027] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" host="10.200.8.10" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.482 [INFO][3027] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31 Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.485 [INFO][3027] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" host="10.200.8.10" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.495 [INFO][3027] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.2/26] block=192.168.55.0/26 handle="k8s-pod-network.1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" host="10.200.8.10" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.495 [INFO][3027] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.2/26] handle="k8s-pod-network.1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" host="10.200.8.10" Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.495 [INFO][3027] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:00.523168 env[1407]: 2024-12-13 14:37:00.495 [INFO][3027] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.2/26] IPv6=[] ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" HandleID="k8s-pod-network.1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.524228 env[1407]: 2024-12-13 14:37:00.497 [INFO][3015] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Namespace="default" Pod="nginx-deployment-6d5f899847-brfsk" WorkloadEndpoint="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4fc68419-02e2-4724-a354-3ca5b4c208ed", ResourceVersion:"1294", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"", Pod:"nginx-deployment-6d5f899847-brfsk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali336531ca815", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:00.524228 env[1407]: 2024-12-13 14:37:00.497 [INFO][3015] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.2/32] ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Namespace="default" Pod="nginx-deployment-6d5f899847-brfsk" WorkloadEndpoint="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.524228 env[1407]: 2024-12-13 14:37:00.497 [INFO][3015] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali336531ca815 ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Namespace="default" Pod="nginx-deployment-6d5f899847-brfsk" WorkloadEndpoint="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.524228 env[1407]: 2024-12-13 14:37:00.511 [INFO][3015] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Namespace="default" Pod="nginx-deployment-6d5f899847-brfsk" WorkloadEndpoint="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.524228 env[1407]: 2024-12-13 14:37:00.512 [INFO][3015] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Namespace="default" Pod="nginx-deployment-6d5f899847-brfsk" WorkloadEndpoint="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4fc68419-02e2-4724-a354-3ca5b4c208ed", ResourceVersion:"1294", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31", Pod:"nginx-deployment-6d5f899847-brfsk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali336531ca815", MAC:"72:a9:55:f6:38:52", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:00.524228 env[1407]: 2024-12-13 14:37:00.520 [INFO][3015] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31" Namespace="default" Pod="nginx-deployment-6d5f899847-brfsk" WorkloadEndpoint="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:00.533000 audit[3047]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_chain pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:37:00.533000 audit[3047]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe668dd940 a2=0 a3=7ffe668dd92c items=0 ppid=2639 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.533000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:37:00.541771 env[1407]: time="2024-12-13T14:37:00.541685330Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:00.541771 env[1407]: time="2024-12-13T14:37:00.541739031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:00.541771 env[1407]: time="2024-12-13T14:37:00.541753531Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:00.543192 env[1407]: time="2024-12-13T14:37:00.542237535Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31 pid=3056 runtime=io.containerd.runc.v2 Dec 13 14:37:00.554448 systemd[1]: Started cri-containerd-1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31.scope. Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.568000 audit: BPF prog-id=108 op=LOAD Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3056 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316430363133363663646139663531653932353261313864393734 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3056 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316430363133363663646139663531653932353261313864393734 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit: BPF prog-id=109 op=LOAD Dec 13 14:37:00.569000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002276e0 items=0 ppid=3056 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316430363133363663646139663531653932353261313864393734 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit: BPF prog-id=110 op=LOAD Dec 13 14:37:00.569000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000227728 items=0 ppid=3056 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316430363133363663646139663531653932353261313864393734 Dec 13 14:37:00.569000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:37:00.569000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:00.569000 audit: BPF prog-id=111 op=LOAD Dec 13 14:37:00.569000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000227b38 items=0 ppid=3056 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316430363133363663646139663531653932353261313864393734 Dec 13 14:37:00.598557 env[1407]: time="2024-12-13T14:37:00.598512420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-brfsk,Uid:4fc68419-02e2-4724-a354-3ca5b4c208ed,Namespace:default,Attempt:1,} returns sandbox id \"1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31\"" Dec 13 14:37:01.135581 systemd[1]: run-netns-cni\x2d29c5a295\x2d5c37\x2d937e\x2da8a3\x2dfd671e1a42f8.mount: Deactivated successfully. Dec 13 14:37:01.229167 kubelet[1973]: E1213 14:37:01.229114 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:01.755798 env[1407]: time="2024-12-13T14:37:01.755747152Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:01.760347 env[1407]: time="2024-12-13T14:37:01.760304891Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:01.764924 env[1407]: time="2024-12-13T14:37:01.764888129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:01.768379 env[1407]: time="2024-12-13T14:37:01.768340258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:01.768886 env[1407]: time="2024-12-13T14:37:01.768854263Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:37:01.770029 env[1407]: time="2024-12-13T14:37:01.769999172Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:37:01.771083 env[1407]: time="2024-12-13T14:37:01.771053781Z" level=info msg="CreateContainer within sandbox \"ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:37:01.797150 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1942722520.mount: Deactivated successfully. Dec 13 14:37:01.811604 env[1407]: time="2024-12-13T14:37:01.811568123Z" level=info msg="CreateContainer within sandbox \"ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e69dcef24b9b46a2fad199bf5eb5f995498453179eaa52fe4a554aed03ac0534\"" Dec 13 14:37:01.812206 env[1407]: time="2024-12-13T14:37:01.812172528Z" level=info msg="StartContainer for \"e69dcef24b9b46a2fad199bf5eb5f995498453179eaa52fe4a554aed03ac0534\"" Dec 13 14:37:01.835989 systemd[1]: Started cri-containerd-e69dcef24b9b46a2fad199bf5eb5f995498453179eaa52fe4a554aed03ac0534.scope. Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f77bc72f9b8 items=0 ppid=2912 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536396463656632346239623436613266616431393962663565623566 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit: BPF prog-id=112 op=LOAD Dec 13 14:37:01.848000 audit[3102]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002f6628 items=0 ppid=2912 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536396463656632346239623436613266616431393962663565623566 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit: BPF prog-id=113 op=LOAD Dec 13 14:37:01.848000 audit[3102]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002f6678 items=0 ppid=2912 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536396463656632346239623436613266616431393962663565623566 Dec 13 14:37:01.848000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:37:01.848000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.848000 audit: BPF prog-id=114 op=LOAD Dec 13 14:37:01.848000 audit[3102]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002f6708 items=0 ppid=2912 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536396463656632346239623436613266616431393962663565623566 Dec 13 14:37:01.867363 env[1407]: time="2024-12-13T14:37:01.866757588Z" level=info msg="StartContainer for \"e69dcef24b9b46a2fad199bf5eb5f995498453179eaa52fe4a554aed03ac0534\" returns successfully" Dec 13 14:37:01.985999 systemd-networkd[1561]: cali336531ca815: Gained IPv6LL Dec 13 14:37:02.230003 kubelet[1973]: E1213 14:37:02.229959 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:02.321275 kubelet[1973]: I1213 14:37:02.321230 1973 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:37:02.321275 kubelet[1973]: I1213 14:37:02.321279 1973 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:37:02.417752 kubelet[1973]: I1213 14:37:02.417701 1973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-qs9pw" podStartSLOduration=34.364047381 podStartE2EDuration="37.417632658s" podCreationTimestamp="2024-12-13 14:36:25 +0000 UTC" firstStartedPulling="2024-12-13 14:36:58.715651589 +0000 UTC m=+34.419719150" lastFinishedPulling="2024-12-13 14:37:01.769236866 +0000 UTC m=+37.473304427" observedRunningTime="2024-12-13 14:37:02.417575457 +0000 UTC m=+38.121643118" watchObservedRunningTime="2024-12-13 14:37:02.417632658 +0000 UTC m=+38.121700319" Dec 13 14:37:03.230844 kubelet[1973]: E1213 14:37:03.230784 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:04.231482 kubelet[1973]: E1213 14:37:04.231426 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:05.203185 kubelet[1973]: E1213 14:37:05.203142 1973 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:05.232445 kubelet[1973]: E1213 14:37:05.232388 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:05.894239 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1701454785.mount: Deactivated successfully. Dec 13 14:37:06.233113 kubelet[1973]: E1213 14:37:06.232972 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:07.233917 kubelet[1973]: E1213 14:37:07.233865 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:08.234853 kubelet[1973]: E1213 14:37:08.234776 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:09.235974 kubelet[1973]: E1213 14:37:09.235925 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:10.236096 kubelet[1973]: E1213 14:37:10.236043 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:10.824260 env[1407]: time="2024-12-13T14:37:10.824209287Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:10.881285 env[1407]: time="2024-12-13T14:37:10.881194586Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:10.926445 env[1407]: time="2024-12-13T14:37:10.926388002Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:10.974097 env[1407]: time="2024-12-13T14:37:10.973986535Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:10.975423 env[1407]: time="2024-12-13T14:37:10.975372445Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:37:10.978172 env[1407]: time="2024-12-13T14:37:10.978135964Z" level=info msg="CreateContainer within sandbox \"1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:37:11.188121 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2567327455.mount: Deactivated successfully. Dec 13 14:37:11.236586 kubelet[1973]: E1213 14:37:11.236529 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:11.318924 env[1407]: time="2024-12-13T14:37:11.318855404Z" level=info msg="CreateContainer within sandbox \"1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"ac7569f8b4aee126cc580b18e82cb6bc0192a54002572915ed1fffa383c68234\"" Dec 13 14:37:11.319528 env[1407]: time="2024-12-13T14:37:11.319485109Z" level=info msg="StartContainer for \"ac7569f8b4aee126cc580b18e82cb6bc0192a54002572915ed1fffa383c68234\"" Dec 13 14:37:11.349101 systemd[1]: Started cri-containerd-ac7569f8b4aee126cc580b18e82cb6bc0192a54002572915ed1fffa383c68234.scope. Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.377432 kernel: kauditd_printk_skb: 196 callbacks suppressed Dec 13 14:37:11.377546 kernel: audit: type=1400 audit(1734100631.357:677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.398317 kernel: audit: type=1400 audit(1734100631.357:678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.410894 kernel: audit: type=1400 audit(1734100631.357:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.428553 kernel: audit: type=1400 audit(1734100631.357:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.428626 kernel: audit: type=1400 audit(1734100631.357:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.428964 env[1407]: time="2024-12-13T14:37:11.428936459Z" level=info msg="StartContainer for \"ac7569f8b4aee126cc580b18e82cb6bc0192a54002572915ed1fffa383c68234\" returns successfully" Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.454659 kernel: audit: type=1400 audit(1734100631.357:682): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.454740 kernel: audit: type=1400 audit(1734100631.357:683): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.466663 kernel: audit: type=1400 audit(1734100631.357:684): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.478729 kernel: audit: type=1400 audit(1734100631.357:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.504052 kernel: audit: type=1400 audit(1734100631.357:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.357000 audit: BPF prog-id=115 op=LOAD Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3056 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:11.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373536396638623461656531323663633538306231386538326362 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3056 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:11.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373536396638623461656531323663633538306231386538326362 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.362000 audit: BPF prog-id=116 op=LOAD Dec 13 14:37:11.362000 audit[3151]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009a370 items=0 ppid=3056 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:11.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373536396638623461656531323663633538306231386538326362 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit: BPF prog-id=117 op=LOAD Dec 13 14:37:11.376000 audit[3151]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009a3b8 items=0 ppid=3056 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:11.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373536396638623461656531323663633538306231386538326362 Dec 13 14:37:11.376000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:37:11.376000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { perfmon } for pid=3151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit[3151]: AVC avc: denied { bpf } for pid=3151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:11.376000 audit: BPF prog-id=118 op=LOAD Dec 13 14:37:11.376000 audit[3151]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009a7c8 items=0 ppid=3056 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:11.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373536396638623461656531323663633538306231386538326362 Dec 13 14:37:12.182664 systemd[1]: run-containerd-runc-k8s.io-ac7569f8b4aee126cc580b18e82cb6bc0192a54002572915ed1fffa383c68234-runc.icACvE.mount: Deactivated successfully. Dec 13 14:37:12.237197 kubelet[1973]: E1213 14:37:12.237138 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:12.430079 kubelet[1973]: I1213 14:37:12.430044 1973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-brfsk" podStartSLOduration=15.054916363 podStartE2EDuration="25.430010571s" podCreationTimestamp="2024-12-13 14:36:47 +0000 UTC" firstStartedPulling="2024-12-13 14:37:00.601202643 +0000 UTC m=+36.305270304" lastFinishedPulling="2024-12-13 14:37:10.976296951 +0000 UTC m=+46.680364512" observedRunningTime="2024-12-13 14:37:12.42984567 +0000 UTC m=+48.133913331" watchObservedRunningTime="2024-12-13 14:37:12.430010571 +0000 UTC m=+48.134078232" Dec 13 14:37:13.238271 kubelet[1973]: E1213 14:37:13.238212 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:14.239293 kubelet[1973]: E1213 14:37:14.239231 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:15.239958 kubelet[1973]: E1213 14:37:15.239900 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:16.240931 kubelet[1973]: E1213 14:37:16.240876 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:17.241912 kubelet[1973]: E1213 14:37:17.241843 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:18.242957 kubelet[1973]: E1213 14:37:18.242895 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:19.243163 kubelet[1973]: E1213 14:37:19.243104 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:19.519000 audit[3205]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.525065 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:37:19.525164 kernel: audit: type=1325 audit(1734100639.519:695): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.519000 audit[3205]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdee9277d0 a2=0 a3=7ffdee9277bc items=0 ppid=2115 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.536992 kubelet[1973]: I1213 14:37:19.536891 1973 topology_manager.go:215] "Topology Admit Handler" podUID="bd0f60fd-e8f4-4293-9356-62d90d7c364f" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:37:19.542798 systemd[1]: Created slice kubepods-besteffort-podbd0f60fd_e8f4_4293_9356_62d90d7c364f.slice. Dec 13 14:37:19.555183 kernel: audit: type=1300 audit(1734100639.519:695): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdee9277d0 a2=0 a3=7ffdee9277bc items=0 ppid=2115 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.555262 kernel: audit: type=1327 audit(1734100639.519:695): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.519000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.557147 kubelet[1973]: I1213 14:37:19.557075 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/bd0f60fd-e8f4-4293-9356-62d90d7c364f-data\") pod \"nfs-server-provisioner-0\" (UID: \"bd0f60fd-e8f4-4293-9356-62d90d7c364f\") " pod="default/nfs-server-provisioner-0" Dec 13 14:37:19.557353 kubelet[1973]: I1213 14:37:19.557342 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z9pwb\" (UniqueName: \"kubernetes.io/projected/bd0f60fd-e8f4-4293-9356-62d90d7c364f-kube-api-access-z9pwb\") pod \"nfs-server-provisioner-0\" (UID: \"bd0f60fd-e8f4-4293-9356-62d90d7c364f\") " pod="default/nfs-server-provisioner-0" Dec 13 14:37:19.540000 audit[3205]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.581142 kernel: audit: type=1325 audit(1734100639.540:696): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.581854 kernel: audit: type=1300 audit(1734100639.540:696): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdee9277d0 a2=0 a3=0 items=0 ppid=2115 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.540000 audit[3205]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdee9277d0 a2=0 a3=0 items=0 ppid=2115 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.600659 kernel: audit: type=1327 audit(1734100639.540:696): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.605000 audit[3209]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.619313 kernel: audit: type=1325 audit(1734100639.605:697): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.619374 kernel: audit: type=1300 audit(1734100639.605:697): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe55135960 a2=0 a3=7ffe5513594c items=0 ppid=2115 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.605000 audit[3209]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe55135960 a2=0 a3=7ffe5513594c items=0 ppid=2115 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.649674 kernel: audit: type=1327 audit(1734100639.605:697): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.649751 kernel: audit: type=1325 audit(1734100639.639:698): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.639000 audit[3209]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.639000 audit[3209]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe55135960 a2=0 a3=0 items=0 ppid=2115 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.847343 env[1407]: time="2024-12-13T14:37:19.847290755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:bd0f60fd-e8f4-4293-9356-62d90d7c364f,Namespace:default,Attempt:0,}" Dec 13 14:37:19.984754 systemd-networkd[1561]: cali60e51b789ff: Link UP Dec 13 14:37:19.997831 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:37:19.997931 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:37:19.998940 systemd-networkd[1561]: cali60e51b789ff: Gained carrier Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.919 [INFO][3212] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.10-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default bd0f60fd-e8f4-4293-9356-62d90d7c364f 1365 0 2024-12-13 14:37:19 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.10 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.10-k8s-nfs--server--provisioner--0-" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.919 [INFO][3212] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.942 [INFO][3223] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" HandleID="k8s-pod-network.87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Workload="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.953 [INFO][3223] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" HandleID="k8s-pod-network.87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Workload="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b930), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.10", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:37:19.942713119 +0000 UTC"}, Hostname:"10.200.8.10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.953 [INFO][3223] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.953 [INFO][3223] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.954 [INFO][3223] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.10' Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.956 [INFO][3223] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" host="10.200.8.10" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.959 [INFO][3223] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.10" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.963 [INFO][3223] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="10.200.8.10" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.964 [INFO][3223] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="10.200.8.10" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.966 [INFO][3223] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="10.200.8.10" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.966 [INFO][3223] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" host="10.200.8.10" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.967 [INFO][3223] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.972 [INFO][3223] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" host="10.200.8.10" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.979 [INFO][3223] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.3/26] block=192.168.55.0/26 handle="k8s-pod-network.87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" host="10.200.8.10" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.979 [INFO][3223] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.3/26] handle="k8s-pod-network.87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" host="10.200.8.10" Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.979 [INFO][3223] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:20.014719 env[1407]: 2024-12-13 14:37:19.979 [INFO][3223] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.3/26] IPv6=[] ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" HandleID="k8s-pod-network.87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Workload="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:37:20.015677 env[1407]: 2024-12-13 14:37:19.981 [INFO][3212] cni-plugin/k8s.go 386: Populated endpoint ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"bd0f60fd-e8f4-4293-9356-62d90d7c364f", ResourceVersion:"1365", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.55.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:20.015677 env[1407]: 2024-12-13 14:37:19.981 [INFO][3212] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.3/32] ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:37:20.015677 env[1407]: 2024-12-13 14:37:19.981 [INFO][3212] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:37:20.015677 env[1407]: 2024-12-13 14:37:19.999 [INFO][3212] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:37:20.015980 env[1407]: 2024-12-13 14:37:20.001 [INFO][3212] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"bd0f60fd-e8f4-4293-9356-62d90d7c364f", ResourceVersion:"1365", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.55.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"8e:47:6b:4c:05:71", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:20.015980 env[1407]: 2024-12-13 14:37:20.013 [INFO][3212] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.10-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:37:20.030000 audit[3246]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3246 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:37:20.030000 audit[3246]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffd2d184440 a2=0 a3=7ffd2d18442c items=0 ppid=2639 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:20.030000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:37:20.033219 env[1407]: time="2024-12-13T14:37:20.033067951Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:20.033219 env[1407]: time="2024-12-13T14:37:20.033104251Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:20.033219 env[1407]: time="2024-12-13T14:37:20.033114151Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:20.033429 env[1407]: time="2024-12-13T14:37:20.033242752Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a pid=3253 runtime=io.containerd.runc.v2 Dec 13 14:37:20.060747 systemd[1]: Started cri-containerd-87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a.scope. Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.072000 audit: BPF prog-id=119 op=LOAD Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3253 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:20.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643365383737636534386361373036616662313762643530393231 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3253 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:20.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643365383737636534386361373036616662313762643530393231 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit: BPF prog-id=120 op=LOAD Dec 13 14:37:20.073000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cdce0 items=0 ppid=3253 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:20.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643365383737636534386361373036616662313762643530393231 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit: BPF prog-id=121 op=LOAD Dec 13 14:37:20.073000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002cdd28 items=0 ppid=3253 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:20.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643365383737636534386361373036616662313762643530393231 Dec 13 14:37:20.073000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:37:20.073000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:20.073000 audit: BPF prog-id=122 op=LOAD Dec 13 14:37:20.073000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d2138 items=0 ppid=3253 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:20.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643365383737636534386361373036616662313762643530393231 Dec 13 14:37:20.101875 env[1407]: time="2024-12-13T14:37:20.101765650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:bd0f60fd-e8f4-4293-9356-62d90d7c364f,Namespace:default,Attempt:0,} returns sandbox id \"87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a\"" Dec 13 14:37:20.105325 env[1407]: time="2024-12-13T14:37:20.104924169Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:37:20.244302 kubelet[1973]: E1213 14:37:20.244250 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:20.669205 systemd[1]: run-containerd-runc-k8s.io-87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a-runc.CivfUo.mount: Deactivated successfully. Dec 13 14:37:21.245038 kubelet[1973]: E1213 14:37:21.244982 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:21.510760 systemd-networkd[1561]: cali60e51b789ff: Gained IPv6LL Dec 13 14:37:22.245489 kubelet[1973]: E1213 14:37:22.245417 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:22.752740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2387596701.mount: Deactivated successfully. Dec 13 14:37:23.246531 kubelet[1973]: E1213 14:37:23.246471 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:27.386029 kubelet[1973]: E1213 14:37:24.246881 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:27.386029 kubelet[1973]: E1213 14:37:25.203356 1973 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:27.386029 kubelet[1973]: E1213 14:37:25.250508 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:27.386029 kubelet[1973]: E1213 14:37:26.251210 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:27.386029 kubelet[1973]: E1213 14:37:27.251844 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:27.387294 env[1407]: time="2024-12-13T14:37:25.229996306Z" level=info msg="StopPodSandbox for \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\"" Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.263 [WARNING][3302] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-csi--node--driver--qs9pw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6", Pod:"csi-node-driver-qs9pw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali052d09fbc58", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.263 [INFO][3302] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.263 [INFO][3302] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" iface="eth0" netns="" Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.263 [INFO][3302] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.263 [INFO][3302] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.281 [INFO][3308] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" HandleID="k8s-pod-network.90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.281 [INFO][3308] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.281 [INFO][3308] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.288 [WARNING][3308] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" HandleID="k8s-pod-network.90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.288 [INFO][3308] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" HandleID="k8s-pod-network.90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.289 [INFO][3308] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:27.387294 env[1407]: 2024-12-13 14:37:25.290 [INFO][3302] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:37:27.387294 env[1407]: time="2024-12-13T14:37:25.291362734Z" level=info msg="TearDown network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\" successfully" Dec 13 14:37:27.387294 env[1407]: time="2024-12-13T14:37:25.291395435Z" level=info msg="StopPodSandbox for \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\" returns successfully" Dec 13 14:37:27.387294 env[1407]: time="2024-12-13T14:37:25.292441040Z" level=info msg="RemovePodSandbox for \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\"" Dec 13 14:37:27.387294 env[1407]: time="2024-12-13T14:37:25.292480340Z" level=info msg="Forcibly stopping sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\"" Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.330 [WARNING][3331] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-csi--node--driver--qs9pw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e64ac9c2-41c4-4eda-bd57-2e9a8c0dc98e", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"ecf3af70d65fc552feffc9d48c5aa8da601709f1575d15274f4d92418172d4b6", Pod:"csi-node-driver-qs9pw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali052d09fbc58", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.330 [INFO][3331] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.330 [INFO][3331] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" iface="eth0" netns="" Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.330 [INFO][3331] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.331 [INFO][3331] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.351 [INFO][3337] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" HandleID="k8s-pod-network.90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.351 [INFO][3337] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.351 [INFO][3337] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.367 [WARNING][3337] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" HandleID="k8s-pod-network.90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.367 [INFO][3337] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" HandleID="k8s-pod-network.90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Workload="10.200.8.10-k8s-csi--node--driver--qs9pw-eth0" Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.368 [INFO][3337] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:27.390559 env[1407]: 2024-12-13 14:37:25.369 [INFO][3331] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511" Dec 13 14:37:27.390559 env[1407]: time="2024-12-13T14:37:25.370398957Z" level=info msg="TearDown network for sandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\" successfully" Dec 13 14:37:27.842686 systemd[1]: run-containerd-runc-k8s.io-74c48418d261a40911472e55c110a340ab8a593948464d15dd04e68040c45cb8-runc.k4RZTk.mount: Deactivated successfully. Dec 13 14:37:28.252568 kubelet[1973]: E1213 14:37:28.252430 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:30.370632 kubelet[1973]: E1213 14:37:29.253332 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:30.370632 kubelet[1973]: E1213 14:37:30.253696 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:31.254703 kubelet[1973]: E1213 14:37:31.254633 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:32.255110 kubelet[1973]: E1213 14:37:32.255050 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:33.255590 kubelet[1973]: E1213 14:37:33.255534 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:33.590578 env[1407]: time="2024-12-13T14:37:33.590515269Z" level=info msg="RemovePodSandbox \"90a817effa5142c634b1a390a00a3e16a49506ed45a0d47016a8d7ab4b337511\" returns successfully" Dec 13 14:37:33.594130 env[1407]: time="2024-12-13T14:37:33.594091386Z" level=info msg="StopPodSandbox for \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\"" Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.691 [WARNING][3382] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4fc68419-02e2-4724-a354-3ca5b4c208ed", ResourceVersion:"1332", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31", Pod:"nginx-deployment-6d5f899847-brfsk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali336531ca815", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.691 [INFO][3382] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.691 [INFO][3382] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" iface="eth0" netns="" Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.691 [INFO][3382] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.691 [INFO][3382] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.731 [INFO][3388] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" HandleID="k8s-pod-network.8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.731 [INFO][3388] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.731 [INFO][3388] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.737 [WARNING][3388] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" HandleID="k8s-pod-network.8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.737 [INFO][3388] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" HandleID="k8s-pod-network.8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.739 [INFO][3388] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:33.742493 env[1407]: 2024-12-13 14:37:33.740 [INFO][3382] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:33.743174 env[1407]: time="2024-12-13T14:37:33.742579690Z" level=info msg="TearDown network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\" successfully" Dec 13 14:37:33.743174 env[1407]: time="2024-12-13T14:37:33.742627091Z" level=info msg="StopPodSandbox for \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\" returns successfully" Dec 13 14:37:33.743264 env[1407]: time="2024-12-13T14:37:33.743241794Z" level=info msg="RemovePodSandbox for \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\"" Dec 13 14:37:33.743323 env[1407]: time="2024-12-13T14:37:33.743279594Z" level=info msg="Forcibly stopping sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\"" Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.810 [WARNING][3409] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4fc68419-02e2-4724-a354-3ca5b4c208ed", ResourceVersion:"1332", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"1d1d061366cda9f51e9252a18d9742675602c146fbc4869a57d5374672bb7f31", Pod:"nginx-deployment-6d5f899847-brfsk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali336531ca815", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.810 [INFO][3409] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.810 [INFO][3409] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" iface="eth0" netns="" Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.810 [INFO][3409] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.810 [INFO][3409] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.847 [INFO][3415] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" HandleID="k8s-pod-network.8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.847 [INFO][3415] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.847 [INFO][3415] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.854 [WARNING][3415] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" HandleID="k8s-pod-network.8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.854 [INFO][3415] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" HandleID="k8s-pod-network.8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Workload="10.200.8.10-k8s-nginx--deployment--6d5f899847--brfsk-eth0" Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.855 [INFO][3415] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:33.858307 env[1407]: 2024-12-13 14:37:33.856 [INFO][3409] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9" Dec 13 14:37:33.859688 env[1407]: time="2024-12-13T14:37:33.859609946Z" level=info msg="TearDown network for sandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\" successfully" Dec 13 14:37:34.256076 kubelet[1973]: E1213 14:37:34.255859 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:35.256694 kubelet[1973]: E1213 14:37:35.256613 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:36.256946 kubelet[1973]: E1213 14:37:36.256862 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:37.257544 kubelet[1973]: E1213 14:37:37.257491 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:38.258352 kubelet[1973]: E1213 14:37:38.258262 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:38.983631 env[1407]: time="2024-12-13T14:37:38.983557829Z" level=info msg="RemovePodSandbox \"8b3b48140a5fc6e8eae7211191bfeb410a5a5765c99c9974553e5111db04fbe9\" returns successfully" Dec 13 14:37:39.259506 kubelet[1973]: E1213 14:37:39.259374 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:40.260105 kubelet[1973]: E1213 14:37:40.260051 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:41.260577 kubelet[1973]: E1213 14:37:41.260528 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:41.660680 env[1407]: time="2024-12-13T14:37:41.660565940Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:41.667691 env[1407]: time="2024-12-13T14:37:41.667545870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:41.672891 env[1407]: time="2024-12-13T14:37:41.672855992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:41.677057 env[1407]: time="2024-12-13T14:37:41.677027310Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:41.677713 env[1407]: time="2024-12-13T14:37:41.677682213Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:37:41.680028 env[1407]: time="2024-12-13T14:37:41.679997123Z" level=info msg="CreateContainer within sandbox \"87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:37:41.713315 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1539464900.mount: Deactivated successfully. Dec 13 14:37:41.733067 env[1407]: time="2024-12-13T14:37:41.733029150Z" level=info msg="CreateContainer within sandbox \"87d3e877ce48ca706afb17bd50921321f90b041e266fe412c839188c31824c3a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"d54e3c4246ad373d2ae000a01763b5884c987526971b12f7b470aa1314f24f52\"" Dec 13 14:37:41.733623 env[1407]: time="2024-12-13T14:37:41.733508752Z" level=info msg="StartContainer for \"d54e3c4246ad373d2ae000a01763b5884c987526971b12f7b470aa1314f24f52\"" Dec 13 14:37:41.759005 systemd[1]: Started cri-containerd-d54e3c4246ad373d2ae000a01763b5884c987526971b12f7b470aa1314f24f52.scope. Dec 13 14:37:41.776896 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:37:41.777003 kernel: audit: type=1400 audit(1734100661.770:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.802629 kernel: audit: type=1400 audit(1734100661.770:719): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.802733 kernel: audit: type=1400 audit(1734100661.770:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.828504 kernel: audit: type=1400 audit(1734100661.770:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.854876 kernel: audit: type=1400 audit(1734100661.770:722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.855183 kernel: audit: type=1400 audit(1734100661.770:723): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.855211 kernel: audit: type=1400 audit(1734100661.770:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.879470 kernel: audit: type=1400 audit(1734100661.770:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.896787 kernel: audit: type=1400 audit(1734100661.770:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.896878 kernel: audit: type=1400 audit(1734100661.788:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.788000 audit: BPF prog-id=123 op=LOAD Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3253 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:41.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435346533633432343661643337336432616530303061303137363362 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3253 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:41.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435346533633432343661643337336432616530303061303137363362 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.793000 audit: BPF prog-id=124 op=LOAD Dec 13 14:37:41.793000 audit[3436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d2c30 items=0 ppid=3253 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:41.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435346533633432343661643337336432616530303061303137363362 Dec 13 14:37:41.813000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.813000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.813000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.813000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.813000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.813000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.813000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.813000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.813000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.813000 audit: BPF prog-id=125 op=LOAD Dec 13 14:37:41.813000 audit[3436]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d2c78 items=0 ppid=3253 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:41.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435346533633432343661643337336432616530303061303137363362 Dec 13 14:37:41.827000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:37:41.827000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { perfmon } for pid=3436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit[3436]: AVC avc: denied { bpf } for pid=3436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:41.827000 audit: BPF prog-id=126 op=LOAD Dec 13 14:37:41.827000 audit[3436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d3088 items=0 ppid=3253 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:41.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435346533633432343661643337336432616530303061303137363362 Dec 13 14:37:41.915198 env[1407]: time="2024-12-13T14:37:41.914539426Z" level=info msg="StartContainer for \"d54e3c4246ad373d2ae000a01763b5884c987526971b12f7b470aa1314f24f52\" returns successfully" Dec 13 14:37:41.941000 audit[3466]: AVC avc: denied { search } for pid=3466 comm="rpcbind" name="crypto" dev="proc" ino=26734 scontext=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:37:41.941000 audit[3466]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ffa0aae90c0 a2=0 a3=0 items=0 ppid=3447 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 key=(null) Dec 13 14:37:41.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:37:41.976000 audit[3471]: AVC avc: denied { search } for pid=3471 comm="dbus-daemon" name="crypto" dev="proc" ino=26734 scontext=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:37:41.976000 audit[3471]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7feec26aa0c0 a2=0 a3=0 items=0 ppid=3447 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 key=(null) Dec 13 14:37:41.976000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:37:41.979000 audit[3472]: AVC avc: denied { watch } for pid=3472 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c131,c670 tclass=dir permissive=0 Dec 13 14:37:41.979000 audit[3472]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5592045b8040 a2=2c8 a3=7fff7b0ddd1c items=0 ppid=3447 pid=3472 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 key=(null) Dec 13 14:37:41.979000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:37:41.984000 audit[3473]: AVC avc: denied { read } for pid=3473 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26790 scontext=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:37:41.984000 audit[3473]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f5a8100a320 a1=80000 a2=d a3=7fff9374f900 items=0 ppid=3447 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 key=(null) Dec 13 14:37:41.984000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:37:41.985000 audit[3473]: AVC avc: denied { search } for pid=3473 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26734 scontext=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:37:41.985000 audit[3473]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5a8055e0c0 a2=0 a3=0 items=0 ppid=3447 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c131,c670 key=(null) Dec 13 14:37:41.985000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:37:42.261822 kubelet[1973]: E1213 14:37:42.261682 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:42.507000 audit[3478]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:42.507000 audit[3478]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff89f9d50 a2=0 a3=7ffff89f9d3c items=0 ppid=2115 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:42.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:42.513000 audit[3478]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:42.513000 audit[3478]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffff89f9d50 a2=0 a3=7ffff89f9d3c items=0 ppid=2115 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:42.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:42.709869 systemd[1]: run-containerd-runc-k8s.io-d54e3c4246ad373d2ae000a01763b5884c987526971b12f7b470aa1314f24f52-runc.RScOyp.mount: Deactivated successfully. Dec 13 14:37:43.262125 kubelet[1973]: E1213 14:37:43.262066 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:44.262415 kubelet[1973]: E1213 14:37:44.262351 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:45.202673 kubelet[1973]: E1213 14:37:45.202590 1973 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:45.263349 kubelet[1973]: E1213 14:37:45.263297 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:46.264233 kubelet[1973]: E1213 14:37:46.264172 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:47.264937 kubelet[1973]: E1213 14:37:47.264877 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:48.265359 kubelet[1973]: E1213 14:37:48.265299 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:49.266210 kubelet[1973]: E1213 14:37:49.266146 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:50.267231 kubelet[1973]: E1213 14:37:50.267167 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:51.267723 kubelet[1973]: E1213 14:37:51.267668 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:52.268817 kubelet[1973]: E1213 14:37:52.268761 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:53.268963 kubelet[1973]: E1213 14:37:53.268908 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:54.269379 kubelet[1973]: E1213 14:37:54.269323 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:55.270381 kubelet[1973]: E1213 14:37:55.270323 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:56.271102 kubelet[1973]: E1213 14:37:56.271038 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:57.271565 kubelet[1973]: E1213 14:37:57.271504 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:57.846602 systemd[1]: run-containerd-runc-k8s.io-74c48418d261a40911472e55c110a340ab8a593948464d15dd04e68040c45cb8-runc.kVfg59.mount: Deactivated successfully. Dec 13 14:37:58.272713 kubelet[1973]: E1213 14:37:58.272656 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:37:59.273448 kubelet[1973]: E1213 14:37:59.273383 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:00.274011 kubelet[1973]: E1213 14:38:00.273949 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:01.274420 kubelet[1973]: E1213 14:38:01.274355 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:02.275110 kubelet[1973]: E1213 14:38:02.275045 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:03.275636 kubelet[1973]: E1213 14:38:03.275572 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:04.276782 kubelet[1973]: E1213 14:38:04.276718 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:05.203338 kubelet[1973]: E1213 14:38:05.203278 1973 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:05.277906 kubelet[1973]: E1213 14:38:05.277844 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:06.279014 kubelet[1973]: E1213 14:38:06.278958 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:06.412153 kubelet[1973]: I1213 14:38:06.412105 1973 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=25.838205164 podStartE2EDuration="47.412062814s" podCreationTimestamp="2024-12-13 14:37:19 +0000 UTC" firstStartedPulling="2024-12-13 14:37:20.104115664 +0000 UTC m=+55.808183225" lastFinishedPulling="2024-12-13 14:37:41.677973314 +0000 UTC m=+77.382040875" observedRunningTime="2024-12-13 14:37:42.494338681 +0000 UTC m=+78.198406242" watchObservedRunningTime="2024-12-13 14:38:06.412062814 +0000 UTC m=+102.116130475" Dec 13 14:38:06.412442 kubelet[1973]: I1213 14:38:06.412386 1973 topology_manager.go:215] "Topology Admit Handler" podUID="46a53cd8-7953-4cce-8ba6-2ac926c76d96" podNamespace="default" podName="test-pod-1" Dec 13 14:38:06.418491 systemd[1]: Created slice kubepods-besteffort-pod46a53cd8_7953_4cce_8ba6_2ac926c76d96.slice. Dec 13 14:38:06.449706 kubelet[1973]: I1213 14:38:06.449671 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-7d90ec07-54ca-4422-a35d-9bafaf352606\" (UniqueName: \"kubernetes.io/nfs/46a53cd8-7953-4cce-8ba6-2ac926c76d96-pvc-7d90ec07-54ca-4422-a35d-9bafaf352606\") pod \"test-pod-1\" (UID: \"46a53cd8-7953-4cce-8ba6-2ac926c76d96\") " pod="default/test-pod-1" Dec 13 14:38:06.449968 kubelet[1973]: I1213 14:38:06.449944 1973 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vt5hn\" (UniqueName: \"kubernetes.io/projected/46a53cd8-7953-4cce-8ba6-2ac926c76d96-kube-api-access-vt5hn\") pod \"test-pod-1\" (UID: \"46a53cd8-7953-4cce-8ba6-2ac926c76d96\") " pod="default/test-pod-1" Dec 13 14:38:06.660380 kernel: Failed to create system directory netfs Dec 13 14:38:06.660522 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:38:06.660550 kernel: audit: type=1400 audit(1734100686.647:743): avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.660576 kernel: Failed to create system directory netfs Dec 13 14:38:06.647000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.679239 kernel: audit: type=1400 audit(1734100686.647:743): avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.679340 kernel: Failed to create system directory netfs Dec 13 14:38:06.647000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.697767 kernel: audit: type=1400 audit(1734100686.647:743): avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.697855 kernel: Failed to create system directory netfs Dec 13 14:38:06.647000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.733822 kernel: audit: type=1400 audit(1734100686.647:743): avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.647000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.736670 kernel: audit: type=1300 audit(1734100686.647:743): arch=c000003e syscall=175 success=yes exit=0 a0=55e2006c45e0 a1=153bc a2=55e1c89312b0 a3=5 items=0 ppid=1550 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:06.647000 audit[3527]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e2006c45e0 a1=153bc a2=55e1c89312b0 a3=5 items=0 ppid=1550 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:06.647000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:38:06.753671 kernel: audit: type=1327 audit(1734100686.647:743): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.796824 kernel: Failed to create system directory fscache Dec 13 14:38:06.796897 kernel: audit: type=1400 audit(1734100686.769:744): avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.796923 kernel: Failed to create system directory fscache Dec 13 14:38:06.796947 kernel: audit: type=1400 audit(1734100686.769:744): avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.823756 kernel: Failed to create system directory fscache Dec 13 14:38:06.823870 kernel: audit: type=1400 audit(1734100686.769:744): avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.843525 kernel: Failed to create system directory fscache Dec 13 14:38:06.843607 kernel: audit: type=1400 audit(1734100686.769:744): avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.859666 kernel: Failed to create system directory fscache Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.866057 kernel: Failed to create system directory fscache Dec 13 14:38:06.866126 kernel: Failed to create system directory fscache Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.872773 kernel: Failed to create system directory fscache Dec 13 14:38:06.872821 kernel: Failed to create system directory fscache Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.879392 kernel: Failed to create system directory fscache Dec 13 14:38:06.879449 kernel: Failed to create system directory fscache Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.883700 kernel: Failed to create system directory fscache Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.889185 kernel: Failed to create system directory fscache Dec 13 14:38:06.889247 kernel: Failed to create system directory fscache Dec 13 14:38:06.769000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.896689 kernel: FS-Cache: Loaded Dec 13 14:38:06.769000 audit[3527]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e2008d99c0 a1=4c0fc a2=55e1c89312b0 a3=5 items=0 ppid=1550 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:06.769000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.990593 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.990692 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.990726 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.997067 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.997153 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.003199 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.003267 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.006785 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.012290 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.012414 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.015661 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.021207 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.021280 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.028622 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.028696 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.034408 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.034469 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.040666 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.040724 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.046068 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.046128 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.051414 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.051463 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.056861 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.056921 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.060665 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.067920 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.067984 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.068008 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.075634 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.075700 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.075723 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.080447 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.080503 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.085354 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.085404 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.090135 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.090190 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.094865 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.094900 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.099523 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.099592 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.105020 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.105070 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.107681 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.112361 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.112413 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.115667 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.119899 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.119954 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.124520 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.124568 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.131526 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.131576 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.136344 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.136392 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.143362 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.143409 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.143439 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.148168 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.148220 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.153240 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.153289 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.157988 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.158054 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.162683 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.162737 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.167584 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.167653 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.172977 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.173025 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.178009 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.178058 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.182867 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.182923 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.187709 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.187759 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.192600 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.192661 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.197508 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.197555 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.202272 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.202310 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.207288 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.207332 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.212062 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.212095 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.217402 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.217445 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.222154 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.222201 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.225110 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.231040 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.231099 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.236155 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.236202 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.241725 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.241806 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.246505 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.246557 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.251351 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.251399 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.256443 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.256488 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.261577 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.261635 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.266613 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.266665 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.271519 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.271568 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.276594 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.279704 kubelet[1973]: E1213 14:38:07.279651 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.281983 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.282036 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.282057 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.286714 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.286761 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.291755 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.291808 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.296967 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.297023 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.301680 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.301742 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.306512 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.306556 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.311407 kernel: Failed to create system directory sunrpc Dec 13 14:38:07.311456 kernel: Failed to create system directory sunrpc Dec 13 14:38:06.969000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.326805 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:38:07.326901 kernel: RPC: Registered udp transport module. Dec 13 14:38:07.326929 kernel: RPC: Registered tcp transport module. Dec 13 14:38:07.332129 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:38:06.969000 audit[3527]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e200925ad0 a1=1a7f1c a2=55e1c89312b0 a3=5 items=6 ppid=1550 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:06.969000 audit: CWD cwd="/" Dec 13 14:38:06.969000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:06.969000 audit: PATH item=1 name=(null) inode=26971 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:06.969000 audit: PATH item=2 name=(null) inode=26971 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:06.969000 audit: PATH item=3 name=(null) inode=26972 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:06.969000 audit: PATH item=4 name=(null) inode=26971 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:06.969000 audit: PATH item=5 name=(null) inode=26973 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:06.969000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.436616 kernel: Failed to create system directory nfs Dec 13 14:38:07.436694 kernel: Failed to create system directory nfs Dec 13 14:38:07.436718 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.448118 kernel: Failed to create system directory nfs Dec 13 14:38:07.448212 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.453101 kernel: Failed to create system directory nfs Dec 13 14:38:07.453159 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.457731 kernel: Failed to create system directory nfs Dec 13 14:38:07.457788 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.462343 kernel: Failed to create system directory nfs Dec 13 14:38:07.462401 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.466911 kernel: Failed to create system directory nfs Dec 13 14:38:07.466963 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.471529 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.473926 kernel: Failed to create system directory nfs Dec 13 14:38:07.473985 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.478515 kernel: Failed to create system directory nfs Dec 13 14:38:07.478564 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.481858 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.485987 kernel: Failed to create system directory nfs Dec 13 14:38:07.486047 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.488715 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.493101 kernel: Failed to create system directory nfs Dec 13 14:38:07.493162 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.495959 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.497927 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.502516 kernel: Failed to create system directory nfs Dec 13 14:38:07.502608 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.507250 kernel: Failed to create system directory nfs Dec 13 14:38:07.507295 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.512102 kernel: Failed to create system directory nfs Dec 13 14:38:07.512150 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.516551 kernel: Failed to create system directory nfs Dec 13 14:38:07.516607 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.521238 kernel: Failed to create system directory nfs Dec 13 14:38:07.521285 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.526952 kernel: Failed to create system directory nfs Dec 13 14:38:07.527029 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.530822 kernel: Failed to create system directory nfs Dec 13 14:38:07.530872 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.535493 kernel: Failed to create system directory nfs Dec 13 14:38:07.535539 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.540263 kernel: Failed to create system directory nfs Dec 13 14:38:07.540315 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.545046 kernel: Failed to create system directory nfs Dec 13 14:38:07.545085 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.549538 kernel: Failed to create system directory nfs Dec 13 14:38:07.549590 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.554187 kernel: Failed to create system directory nfs Dec 13 14:38:07.554246 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.558601 kernel: Failed to create system directory nfs Dec 13 14:38:07.558673 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.568569 kernel: Failed to create system directory nfs Dec 13 14:38:07.568613 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.570743 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.573041 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.575343 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.577675 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.580061 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.582254 kernel: Failed to create system directory nfs Dec 13 14:38:07.419000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.419000 audit[3527]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e200b46700 a1=16e97c a2=55e1c89312b0 a3=5 items=0 ppid=1550 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.419000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:38:07.607671 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.667588 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.667693 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.667721 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.670710 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.681695 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.682655 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.686896 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.686952 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.691806 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.691860 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.696785 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.696839 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.701850 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.701891 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.706899 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.706947 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.711838 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.711889 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.716762 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.716814 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.721784 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.721833 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.726931 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.726994 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.731831 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.731881 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.737005 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.737062 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.741981 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.742018 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.747327 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.747376 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.752146 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.752202 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.757146 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.757201 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.762076 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.762130 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.767161 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.772315 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.772379 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.772409 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.777058 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.777109 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.779684 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.782691 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.789688 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.793741 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.793782 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.798517 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.798555 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.803202 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.803237 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.805543 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.810000 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.810059 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.812342 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.817510 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.817571 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.822098 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.822158 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.826994 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.827058 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.831950 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.832008 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.837090 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.837155 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.842125 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.842183 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.846965 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.847031 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.851760 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.851829 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.856532 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.856578 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.861319 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.863939 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.864000 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.868981 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.869046 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.873680 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.879243 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.879306 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.879330 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.884143 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.884202 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.895600 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.895678 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.900452 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.900501 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.905095 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.905153 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.907692 kernel: Failed to create system directory nfs4 Dec 13 14:38:07.645000 audit[3532]: AVC avc: denied { confidentiality } for pid=3532 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:07.912294 kernel: Failed to create system directory nfs4 Dec 13 14:38:08.046884 kernel: NFS: Registering the id_resolver key type Dec 13 14:38:08.047086 kernel: Key type id_resolver registered Dec 13 14:38:08.050033 kernel: Key type id_legacy registered Dec 13 14:38:07.645000 audit[3532]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fd2bb736010 a1=208de4 a2=5587d09f82b0 a3=5 items=0 ppid=1550 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.645000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.101593 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.101680 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.101706 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.106823 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.106879 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.112136 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.112184 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.118349 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.118414 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.123623 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.123676 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.128946 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.129001 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.134049 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.134112 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.139207 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.139269 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.144553 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.144612 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.149629 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.149685 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.152839 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.157291 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.157341 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.162531 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.162586 kernel: Failed to create system directory rpcgss Dec 13 14:38:08.090000 audit[3533]: AVC avc: denied { confidentiality } for pid=3533 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:08.090000 audit[3533]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe690d77010 a1=70af4 a2=55d614c2b2b0 a3=5 items=0 ppid=1550 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:08.090000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:38:08.280574 kubelet[1973]: E1213 14:38:08.280510 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:08.342769 nfsidmap[3541]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-f5c8c23acc' Dec 13 14:38:08.364257 nfsidmap[3542]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-f5c8c23acc' Dec 13 14:38:08.374000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2900 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:38:08.374000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2900 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:38:08.374000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2900 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:38:08.374000 audit[1514]: AVC avc: denied { watch_reads } for pid=1514 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2900 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:38:08.374000 audit[1514]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a87b1b2470 a2=10 a3=71d3878bae80e050 items=0 ppid=1 pid=1514 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:08.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:38:08.374000 audit[1514]: AVC avc: denied { watch_reads } for pid=1514 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2900 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:38:08.374000 audit[1514]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a87b1b2470 a2=10 a3=71d3878bae80e050 items=0 ppid=1 pid=1514 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:08.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:38:08.374000 audit[1514]: AVC avc: denied { watch_reads } for pid=1514 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2900 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:38:08.374000 audit[1514]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a87b1b2470 a2=10 a3=71d3878bae80e050 items=0 ppid=1 pid=1514 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:08.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:38:08.522370 env[1407]: time="2024-12-13T14:38:08.522314517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:46a53cd8-7953-4cce-8ba6-2ac926c76d96,Namespace:default,Attempt:0,}" Dec 13 14:38:09.281118 kubelet[1973]: E1213 14:38:09.281053 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:10.281741 kubelet[1973]: E1213 14:38:10.281621 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:11.282745 kubelet[1973]: E1213 14:38:11.282688 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:12.283918 kubelet[1973]: E1213 14:38:12.283858 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:13.284913 kubelet[1973]: E1213 14:38:13.284849 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:14.285943 kubelet[1973]: E1213 14:38:14.285883 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:15.286879 kubelet[1973]: E1213 14:38:15.286820 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:16.287245 kubelet[1973]: E1213 14:38:16.287194 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:17.287728 kubelet[1973]: E1213 14:38:17.287671 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:17.940728 systemd-networkd[1561]: cali5ec59c6bf6e: Link UP Dec 13 14:38:17.946861 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:38:17.946954 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:38:17.947252 systemd-networkd[1561]: cali5ec59c6bf6e: Gained carrier Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.875 [INFO][3550] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.10-k8s-test--pod--1-eth0 default 46a53cd8-7953-4cce-8ba6-2ac926c76d96 1492 0 2024-12-13 14:37:20 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.10 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.10-k8s-test--pod--1-" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.875 [INFO][3550] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.10-k8s-test--pod--1-eth0" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.900 [INFO][3561] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" HandleID="k8s-pod-network.f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Workload="10.200.8.10-k8s-test--pod--1-eth0" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.910 [INFO][3561] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" HandleID="k8s-pod-network.f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Workload="10.200.8.10-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318c30), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.10", "pod":"test-pod-1", "timestamp":"2024-12-13 14:38:17.900691792 +0000 UTC"}, Hostname:"10.200.8.10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.910 [INFO][3561] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.910 [INFO][3561] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.910 [INFO][3561] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.10' Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.912 [INFO][3561] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" host="10.200.8.10" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.915 [INFO][3561] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.10" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.919 [INFO][3561] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="10.200.8.10" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.920 [INFO][3561] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="10.200.8.10" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.922 [INFO][3561] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="10.200.8.10" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.922 [INFO][3561] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" host="10.200.8.10" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.923 [INFO][3561] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6 Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.930 [INFO][3561] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" host="10.200.8.10" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.936 [INFO][3561] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.4/26] block=192.168.55.0/26 handle="k8s-pod-network.f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" host="10.200.8.10" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.936 [INFO][3561] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.4/26] handle="k8s-pod-network.f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" host="10.200.8.10" Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.936 [INFO][3561] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:17.962471 env[1407]: 2024-12-13 14:38:17.936 [INFO][3561] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.4/26] IPv6=[] ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" HandleID="k8s-pod-network.f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Workload="10.200.8.10-k8s-test--pod--1-eth0" Dec 13 14:38:17.963489 env[1407]: 2024-12-13 14:38:17.937 [INFO][3550] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.10-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"46a53cd8-7953-4cce-8ba6-2ac926c76d96", ResourceVersion:"1492", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:17.963489 env[1407]: 2024-12-13 14:38:17.937 [INFO][3550] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.4/32] ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.10-k8s-test--pod--1-eth0" Dec 13 14:38:17.963489 env[1407]: 2024-12-13 14:38:17.937 [INFO][3550] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.10-k8s-test--pod--1-eth0" Dec 13 14:38:17.963489 env[1407]: 2024-12-13 14:38:17.948 [INFO][3550] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.10-k8s-test--pod--1-eth0" Dec 13 14:38:17.963489 env[1407]: 2024-12-13 14:38:17.948 [INFO][3550] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.10-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.10-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"46a53cd8-7953-4cce-8ba6-2ac926c76d96", ResourceVersion:"1492", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.10", ContainerID:"f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"36:01:06:7b:da:2d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:17.963489 env[1407]: 2024-12-13 14:38:17.957 [INFO][3550] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.10-k8s-test--pod--1-eth0" Dec 13 14:38:17.986000 audit[3583]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:17.991556 env[1407]: time="2024-12-13T14:38:17.991495080Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:38:17.991743 env[1407]: time="2024-12-13T14:38:17.991717480Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:38:17.991824 kernel: kauditd_printk_skb: 345 callbacks suppressed Dec 13 14:38:17.991867 kernel: audit: type=1325 audit(1734100697.986:755): table=filter:81 family=2 entries=38 op=nft_register_chain pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:17.991939 env[1407]: time="2024-12-13T14:38:17.991917381Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:38:17.992276 env[1407]: time="2024-12-13T14:38:17.992240082Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6 pid=3590 runtime=io.containerd.runc.v2 Dec 13 14:38:17.986000 audit[3583]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffcefa168c0 a2=0 a3=7ffcefa168ac items=0 ppid=2639 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.017886 kernel: audit: type=1300 audit(1734100697.986:755): arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffcefa168c0 a2=0 a3=7ffcefa168ac items=0 ppid=2639 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:17.986000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:18.035677 kernel: audit: type=1327 audit(1734100697.986:755): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:18.049281 systemd[1]: run-containerd-runc-k8s.io-f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6-runc.ROoPbT.mount: Deactivated successfully. Dec 13 14:38:18.054795 systemd[1]: Started cri-containerd-f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6.scope. Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.076655 kernel: audit: type=1400 audit(1734100698.063:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.097802 kernel: audit: type=1400 audit(1734100698.063:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.098320 kernel: audit: type=1400 audit(1734100698.063:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.109498 kernel: audit: type=1400 audit(1734100698.063:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.120587 kernel: audit: type=1400 audit(1734100698.063:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.143659 kernel: audit: type=1400 audit(1734100698.063:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.145016 kernel: audit: type=1400 audit(1734100698.063:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.063000 audit: BPF prog-id=127 op=LOAD Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3590 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363561653336653931656438633333366237383237306166623635 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3590 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363561653336653931656438633333366237383237306166623635 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.065000 audit: BPF prog-id=128 op=LOAD Dec 13 14:38:18.065000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031dd80 items=0 ppid=3590 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363561653336653931656438633333366237383237306166623635 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit: BPF prog-id=129 op=LOAD Dec 13 14:38:18.074000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031ddc8 items=0 ppid=3590 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363561653336653931656438633333366237383237306166623635 Dec 13 14:38:18.074000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:38:18.074000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.074000 audit: BPF prog-id=130 op=LOAD Dec 13 14:38:18.074000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003861d8 items=0 ppid=3590 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363561653336653931656438633333366237383237306166623635 Dec 13 14:38:18.147317 env[1407]: time="2024-12-13T14:38:18.146765570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:46a53cd8-7953-4cce-8ba6-2ac926c76d96,Namespace:default,Attempt:0,} returns sandbox id \"f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6\"" Dec 13 14:38:18.148478 env[1407]: time="2024-12-13T14:38:18.148449075Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:38:18.288752 kubelet[1973]: E1213 14:38:18.288625 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:18.513997 env[1407]: time="2024-12-13T14:38:18.513945628Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:18.517992 env[1407]: time="2024-12-13T14:38:18.517953341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:18.522558 env[1407]: time="2024-12-13T14:38:18.522524056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:18.526340 env[1407]: time="2024-12-13T14:38:18.526307667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:18.526870 env[1407]: time="2024-12-13T14:38:18.526840369Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:38:18.528958 env[1407]: time="2024-12-13T14:38:18.528927276Z" level=info msg="CreateContainer within sandbox \"f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:38:18.564092 env[1407]: time="2024-12-13T14:38:18.563985286Z" level=info msg="CreateContainer within sandbox \"f965ae36e91ed8c336b78270afb659a3b5ef535bec4b71b2647eba0f9132aff6\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"4266ab117af10d985239f277e2874cd2eece3f621144a65a2ea1026504025f82\"" Dec 13 14:38:18.564798 env[1407]: time="2024-12-13T14:38:18.564671689Z" level=info msg="StartContainer for \"4266ab117af10d985239f277e2874cd2eece3f621144a65a2ea1026504025f82\"" Dec 13 14:38:18.580892 systemd[1]: Started cri-containerd-4266ab117af10d985239f277e2874cd2eece3f621144a65a2ea1026504025f82.scope. Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit: BPF prog-id=131 op=LOAD Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3590 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363661623131376166313064393835323339663237376532383734 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3590 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363661623131376166313064393835323339663237376532383734 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.594000 audit: BPF prog-id=132 op=LOAD Dec 13 14:38:18.594000 audit[3634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00032dd50 items=0 ppid=3590 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363661623131376166313064393835323339663237376532383734 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit: BPF prog-id=133 op=LOAD Dec 13 14:38:18.595000 audit[3634]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00032dd98 items=0 ppid=3590 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363661623131376166313064393835323339663237376532383734 Dec 13 14:38:18.595000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:38:18.595000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:18.595000 audit: BPF prog-id=134 op=LOAD Dec 13 14:38:18.595000 audit[3634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003961a8 items=0 ppid=3590 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:18.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363661623131376166313064393835323339663237376532383734 Dec 13 14:38:18.614273 env[1407]: time="2024-12-13T14:38:18.614237745Z" level=info msg="StartContainer for \"4266ab117af10d985239f277e2874cd2eece3f621144a65a2ea1026504025f82\" returns successfully" Dec 13 14:38:19.289184 kubelet[1973]: E1213 14:38:19.289127 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:19.298787 systemd-networkd[1561]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:38:20.290058 kubelet[1973]: E1213 14:38:20.290006 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:21.291025 kubelet[1973]: E1213 14:38:21.290964 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:22.292006 kubelet[1973]: E1213 14:38:22.291944 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:23.292955 kubelet[1973]: E1213 14:38:23.292910 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:24.293856 kubelet[1973]: E1213 14:38:24.293802 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:25.203061 kubelet[1973]: E1213 14:38:25.203001 1973 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:25.294831 kubelet[1973]: E1213 14:38:25.294787 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:38:26.295425 kubelet[1973]: E1213 14:38:26.295364 1973 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"