Dec 13 14:32:49.041206 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:32:49.041232 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:32:49.041241 kernel: BIOS-provided physical RAM map: Dec 13 14:32:49.041247 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:32:49.041256 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Dec 13 14:32:49.041262 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Dec 13 14:32:49.041274 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Dec 13 14:32:49.041280 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Dec 13 14:32:49.041286 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Dec 13 14:32:49.041295 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Dec 13 14:32:49.041301 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Dec 13 14:32:49.041309 kernel: printk: bootconsole [earlyser0] enabled Dec 13 14:32:49.041316 kernel: NX (Execute Disable) protection: active Dec 13 14:32:49.041322 kernel: efi: EFI v2.70 by Microsoft Dec 13 14:32:49.041333 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Dec 13 14:32:49.041341 kernel: random: crng init done Dec 13 14:32:49.041349 kernel: SMBIOS 3.1.0 present. Dec 13 14:32:49.041356 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Dec 13 14:32:49.041363 kernel: Hypervisor detected: Microsoft Hyper-V Dec 13 14:32:49.041369 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Dec 13 14:32:49.041378 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Dec 13 14:32:49.041385 kernel: Hyper-V: Nested features: 0x1e0101 Dec 13 14:32:49.041395 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Dec 13 14:32:49.041402 kernel: Hyper-V: Using hypercall for remote TLB flush Dec 13 14:32:49.041408 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Dec 13 14:32:49.041418 kernel: tsc: Marking TSC unstable due to running on Hyper-V Dec 13 14:32:49.041425 kernel: tsc: Detected 2593.906 MHz processor Dec 13 14:32:49.041435 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:32:49.041441 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:32:49.041448 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Dec 13 14:32:49.041454 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:32:49.041463 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Dec 13 14:32:49.041472 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Dec 13 14:32:49.041480 kernel: Using GB pages for direct mapping Dec 13 14:32:49.041488 kernel: Secure boot disabled Dec 13 14:32:49.041498 kernel: ACPI: Early table checksum verification disabled Dec 13 14:32:49.041505 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Dec 13 14:32:49.041515 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:49.041522 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:49.041531 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Dec 13 14:32:49.041543 kernel: ACPI: FACS 0x000000003FFFE000 000040 Dec 13 14:32:49.041553 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:49.041560 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:49.041570 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:49.041577 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:49.041584 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:49.041596 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:49.041603 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:49.041613 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Dec 13 14:32:49.041620 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Dec 13 14:32:49.041628 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Dec 13 14:32:49.041637 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Dec 13 14:32:49.041645 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Dec 13 14:32:49.041654 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Dec 13 14:32:49.041663 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Dec 13 14:32:49.041672 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Dec 13 14:32:49.041681 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Dec 13 14:32:49.041690 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Dec 13 14:32:49.041698 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:32:49.041705 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:32:49.041714 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Dec 13 14:32:49.041722 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Dec 13 14:32:49.048759 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Dec 13 14:32:49.048785 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Dec 13 14:32:49.048799 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Dec 13 14:32:49.048812 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Dec 13 14:32:49.048825 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Dec 13 14:32:49.048838 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Dec 13 14:32:49.048851 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Dec 13 14:32:49.048864 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Dec 13 14:32:49.048877 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Dec 13 14:32:49.048890 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Dec 13 14:32:49.048906 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Dec 13 14:32:49.048919 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Dec 13 14:32:49.048932 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Dec 13 14:32:49.048944 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Dec 13 14:32:49.048957 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Dec 13 14:32:49.048970 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Dec 13 14:32:49.048983 kernel: Zone ranges: Dec 13 14:32:49.048996 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:32:49.049009 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:32:49.049024 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:32:49.049037 kernel: Movable zone start for each node Dec 13 14:32:49.049050 kernel: Early memory node ranges Dec 13 14:32:49.049063 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:32:49.049076 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Dec 13 14:32:49.049089 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Dec 13 14:32:49.049101 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:32:49.049114 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Dec 13 14:32:49.049127 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:32:49.049142 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:32:49.049155 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Dec 13 14:32:49.049168 kernel: ACPI: PM-Timer IO Port: 0x408 Dec 13 14:32:49.049181 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Dec 13 14:32:49.049194 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:32:49.049207 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:32:49.049220 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:32:49.049233 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Dec 13 14:32:49.049246 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:32:49.049261 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Dec 13 14:32:49.049274 kernel: Booting paravirtualized kernel on Hyper-V Dec 13 14:32:49.049287 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:32:49.049299 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:32:49.049313 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:32:49.049325 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:32:49.049338 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:32:49.049350 kernel: Hyper-V: PV spinlocks enabled Dec 13 14:32:49.049363 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:32:49.049378 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Dec 13 14:32:49.049391 kernel: Policy zone: Normal Dec 13 14:32:49.049406 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:32:49.049419 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:32:49.049431 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:32:49.049444 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:32:49.049457 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:32:49.049470 kernel: Memory: 8079088K/8387460K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 308112K reserved, 0K cma-reserved) Dec 13 14:32:49.049485 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:32:49.049499 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:32:49.049521 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:32:49.049537 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:32:49.049551 kernel: rcu: RCU event tracing is enabled. Dec 13 14:32:49.049565 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:32:49.049579 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:32:49.049592 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:32:49.049605 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:32:49.049618 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:32:49.049632 kernel: Using NULL legacy PIC Dec 13 14:32:49.049649 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Dec 13 14:32:49.049662 kernel: Console: colour dummy device 80x25 Dec 13 14:32:49.049676 kernel: printk: console [tty1] enabled Dec 13 14:32:49.049689 kernel: printk: console [ttyS0] enabled Dec 13 14:32:49.049703 kernel: printk: bootconsole [earlyser0] disabled Dec 13 14:32:49.049718 kernel: ACPI: Core revision 20210730 Dec 13 14:32:49.049748 kernel: Failed to register legacy timer interrupt Dec 13 14:32:49.049760 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:32:49.049772 kernel: Hyper-V: Using IPI hypercalls Dec 13 14:32:49.049785 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Dec 13 14:32:49.049798 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:32:49.049811 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:32:49.049823 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:32:49.049836 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:32:49.049848 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:32:49.049864 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:32:49.049876 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:32:49.049887 kernel: RETBleed: Vulnerable Dec 13 14:32:49.049900 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:32:49.049912 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:32:49.049924 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:32:49.049936 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:32:49.049949 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:32:49.049962 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:32:49.049975 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:32:49.049990 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:32:49.050002 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:32:49.050013 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:32:49.050024 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:32:49.050036 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 14:32:49.050048 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 14:32:49.050060 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 14:32:49.050073 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Dec 13 14:32:49.050085 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:32:49.050097 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:32:49.050112 kernel: LSM: Security Framework initializing Dec 13 14:32:49.050123 kernel: SELinux: Initializing. Dec 13 14:32:49.050139 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:32:49.050151 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:32:49.050164 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:32:49.050185 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:32:49.050197 kernel: signal: max sigframe size: 3632 Dec 13 14:32:49.050209 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:32:49.050220 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:32:49.050231 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:32:49.050243 kernel: x86: Booting SMP configuration: Dec 13 14:32:49.050255 kernel: .... node #0, CPUs: #1 Dec 13 14:32:49.050271 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Dec 13 14:32:49.050285 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:32:49.050299 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:32:49.050312 kernel: smpboot: Max logical packages: 1 Dec 13 14:32:49.050326 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Dec 13 14:32:49.050338 kernel: devtmpfs: initialized Dec 13 14:32:49.050350 kernel: x86/mm: Memory block size: 128MB Dec 13 14:32:49.050362 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Dec 13 14:32:49.050376 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:32:49.050389 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:32:49.050402 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:32:49.050415 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:32:49.050427 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:32:49.050439 kernel: audit: type=2000 audit(1734100368.023:1): state=initialized audit_enabled=0 res=1 Dec 13 14:32:49.050451 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:32:49.050463 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:32:49.050476 kernel: cpuidle: using governor menu Dec 13 14:32:49.050490 kernel: ACPI: bus type PCI registered Dec 13 14:32:49.050503 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:32:49.050515 kernel: dca service started, version 1.12.1 Dec 13 14:32:49.050529 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:32:49.050542 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:32:49.050554 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:32:49.050566 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:32:49.050578 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:32:49.050592 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:32:49.050609 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:32:49.050624 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:32:49.050638 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:32:49.050652 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:32:49.050667 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:32:49.050681 kernel: ACPI: Interpreter enabled Dec 13 14:32:49.050694 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:32:49.050708 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:32:49.050721 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:32:49.050755 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Dec 13 14:32:49.050769 kernel: iommu: Default domain type: Translated Dec 13 14:32:49.050783 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:32:49.050795 kernel: vgaarb: loaded Dec 13 14:32:49.050809 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:32:49.050823 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:32:49.050836 kernel: PTP clock support registered Dec 13 14:32:49.050850 kernel: Registered efivars operations Dec 13 14:32:49.050863 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:32:49.050877 kernel: PCI: System does not support PCI Dec 13 14:32:49.050893 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Dec 13 14:32:49.050906 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:32:49.050920 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:32:49.050933 kernel: pnp: PnP ACPI init Dec 13 14:32:49.050946 kernel: pnp: PnP ACPI: found 3 devices Dec 13 14:32:49.050960 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:32:49.050972 kernel: NET: Registered PF_INET protocol family Dec 13 14:32:49.050986 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:32:49.051002 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:32:49.051016 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:32:49.051029 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:32:49.051042 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:32:49.051055 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:32:49.051069 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:32:49.051083 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:32:49.051096 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:32:49.051109 kernel: NET: Registered PF_XDP protocol family Dec 13 14:32:49.051125 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:32:49.051139 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:32:49.051152 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Dec 13 14:32:49.051166 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:32:49.051179 kernel: Initialise system trusted keyrings Dec 13 14:32:49.051193 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:32:49.051206 kernel: Key type asymmetric registered Dec 13 14:32:49.051219 kernel: Asymmetric key parser 'x509' registered Dec 13 14:32:49.051233 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:32:49.051249 kernel: io scheduler mq-deadline registered Dec 13 14:32:49.051262 kernel: io scheduler kyber registered Dec 13 14:32:49.051276 kernel: io scheduler bfq registered Dec 13 14:32:49.051288 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:32:49.051302 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:32:49.051315 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:32:49.051328 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:32:49.051342 kernel: i8042: PNP: No PS/2 controller found. Dec 13 14:32:49.051522 kernel: rtc_cmos 00:02: registered as rtc0 Dec 13 14:32:49.051644 kernel: rtc_cmos 00:02: setting system clock to 2024-12-13T14:32:48 UTC (1734100368) Dec 13 14:32:49.051776 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Dec 13 14:32:49.051793 kernel: fail to initialize ptp_kvm Dec 13 14:32:49.051806 kernel: intel_pstate: CPU model not supported Dec 13 14:32:49.051820 kernel: efifb: probing for efifb Dec 13 14:32:49.051833 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:32:49.051846 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:32:49.051859 kernel: efifb: scrolling: redraw Dec 13 14:32:49.051876 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:32:49.051889 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:32:49.051901 kernel: fb0: EFI VGA frame buffer device Dec 13 14:32:49.051913 kernel: pstore: Registered efi as persistent store backend Dec 13 14:32:49.051925 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:32:49.051937 kernel: Segment Routing with IPv6 Dec 13 14:32:49.051950 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:32:49.051962 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:32:49.051974 kernel: Key type dns_resolver registered Dec 13 14:32:49.051989 kernel: IPI shorthand broadcast: enabled Dec 13 14:32:49.052002 kernel: sched_clock: Marking stable (843850500, 23624700)->(1080896100, -213420900) Dec 13 14:32:49.052015 kernel: registered taskstats version 1 Dec 13 14:32:49.052027 kernel: Loading compiled-in X.509 certificates Dec 13 14:32:49.052040 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:32:49.052053 kernel: Key type .fscrypt registered Dec 13 14:32:49.052066 kernel: Key type fscrypt-provisioning registered Dec 13 14:32:49.052079 kernel: pstore: Using crash dump compression: deflate Dec 13 14:32:49.052095 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:32:49.052110 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:32:49.052124 kernel: ima: No architecture policies found Dec 13 14:32:49.052138 kernel: clk: Disabling unused clocks Dec 13 14:32:49.052153 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:32:49.052167 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:32:49.052181 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:32:49.052196 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:32:49.052210 kernel: Run /init as init process Dec 13 14:32:49.052225 kernel: with arguments: Dec 13 14:32:49.052242 kernel: /init Dec 13 14:32:49.052257 kernel: with environment: Dec 13 14:32:49.052272 kernel: HOME=/ Dec 13 14:32:49.052286 kernel: TERM=linux Dec 13 14:32:49.052301 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:32:49.052318 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:32:49.052335 systemd[1]: Detected virtualization microsoft. Dec 13 14:32:49.052352 systemd[1]: Detected architecture x86-64. Dec 13 14:32:49.052365 systemd[1]: Running in initrd. Dec 13 14:32:49.052378 systemd[1]: No hostname configured, using default hostname. Dec 13 14:32:49.052390 systemd[1]: Hostname set to . Dec 13 14:32:49.052402 systemd[1]: Initializing machine ID from random generator. Dec 13 14:32:49.052414 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:32:49.052427 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:32:49.052439 systemd[1]: Reached target cryptsetup.target. Dec 13 14:32:49.052451 systemd[1]: Reached target paths.target. Dec 13 14:32:49.052467 systemd[1]: Reached target slices.target. Dec 13 14:32:49.052481 systemd[1]: Reached target swap.target. Dec 13 14:32:49.052494 systemd[1]: Reached target timers.target. Dec 13 14:32:49.052508 systemd[1]: Listening on iscsid.socket. Dec 13 14:32:49.052521 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:32:49.052534 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:32:49.052546 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:32:49.052562 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:32:49.052575 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:32:49.052588 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:32:49.052601 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:32:49.052614 systemd[1]: Reached target sockets.target. Dec 13 14:32:49.052627 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:32:49.052640 systemd[1]: Finished network-cleanup.service. Dec 13 14:32:49.052654 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:32:49.052667 systemd[1]: Starting systemd-journald.service... Dec 13 14:32:49.052682 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:32:49.052695 systemd[1]: Starting systemd-resolved.service... Dec 13 14:32:49.052709 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:32:49.052738 systemd-journald[183]: Journal started Dec 13 14:32:49.052816 systemd-journald[183]: Runtime Journal (/run/log/journal/62dfb0b5df0549f8aab3e8562bde83ea) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:32:49.047708 systemd-modules-load[184]: Inserted module 'overlay' Dec 13 14:32:49.062745 systemd[1]: Started systemd-journald.service. Dec 13 14:32:49.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.072766 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:32:49.089806 kernel: audit: type=1130 audit(1734100369.070:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.085745 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:32:49.097511 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:32:49.125687 kernel: audit: type=1130 audit(1734100369.084:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.125746 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:32:49.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.117146 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:32:49.132117 systemd-resolved[185]: Positive Trust Anchors: Dec 13 14:32:49.132129 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:32:49.132178 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:32:49.135771 systemd-resolved[185]: Defaulting to hostname 'linux'. Dec 13 14:32:49.137355 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:32:49.146376 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:32:49.168366 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:32:49.213571 kernel: audit: type=1130 audit(1734100369.096:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.213603 kernel: Bridge firewalling registered Dec 13 14:32:49.213624 kernel: audit: type=1130 audit(1734100369.114:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.175165 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:32:49.206542 systemd[1]: Started systemd-resolved.service. Dec 13 14:32:49.209099 systemd[1]: Reached target nss-lookup.target. Dec 13 14:32:49.214527 systemd-modules-load[184]: Inserted module 'br_netfilter' Dec 13 14:32:49.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.237800 kernel: audit: type=1130 audit(1734100369.164:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.251122 dracut-cmdline[199]: dracut-dracut-053 Dec 13 14:32:49.268446 kernel: audit: type=1130 audit(1734100369.172:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.268477 kernel: SCSI subsystem initialized Dec 13 14:32:49.268494 kernel: audit: type=1130 audit(1734100369.208:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.268566 dracut-cmdline[199]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:32:49.301201 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:32:49.301267 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:32:49.307197 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:32:49.311333 systemd-modules-load[184]: Inserted module 'dm_multipath' Dec 13 14:32:49.312384 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:32:49.336234 kernel: audit: type=1130 audit(1734100369.316:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.318253 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:32:49.339703 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:32:49.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.361940 kernel: audit: type=1130 audit(1734100369.343:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.361976 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:32:49.381751 kernel: iscsi: registered transport (tcp) Dec 13 14:32:49.409724 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:32:49.409784 kernel: QLogic iSCSI HBA Driver Dec 13 14:32:49.438445 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:32:49.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.444424 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:32:49.495753 kernel: raid6: avx512x4 gen() 18310 MB/s Dec 13 14:32:49.515744 kernel: raid6: avx512x4 xor() 8159 MB/s Dec 13 14:32:49.535739 kernel: raid6: avx512x2 gen() 18282 MB/s Dec 13 14:32:49.556743 kernel: raid6: avx512x2 xor() 29609 MB/s Dec 13 14:32:49.576737 kernel: raid6: avx512x1 gen() 17904 MB/s Dec 13 14:32:49.596740 kernel: raid6: avx512x1 xor() 26325 MB/s Dec 13 14:32:49.617743 kernel: raid6: avx2x4 gen() 18265 MB/s Dec 13 14:32:49.637736 kernel: raid6: avx2x4 xor() 7829 MB/s Dec 13 14:32:49.657738 kernel: raid6: avx2x2 gen() 18159 MB/s Dec 13 14:32:49.678745 kernel: raid6: avx2x2 xor() 21894 MB/s Dec 13 14:32:49.698736 kernel: raid6: avx2x1 gen() 13940 MB/s Dec 13 14:32:49.718737 kernel: raid6: avx2x1 xor() 19214 MB/s Dec 13 14:32:49.739744 kernel: raid6: sse2x4 gen() 11355 MB/s Dec 13 14:32:49.759739 kernel: raid6: sse2x4 xor() 7143 MB/s Dec 13 14:32:49.779756 kernel: raid6: sse2x2 gen() 12716 MB/s Dec 13 14:32:49.800740 kernel: raid6: sse2x2 xor() 7476 MB/s Dec 13 14:32:49.820738 kernel: raid6: sse2x1 gen() 11408 MB/s Dec 13 14:32:49.843958 kernel: raid6: sse2x1 xor() 5845 MB/s Dec 13 14:32:49.843975 kernel: raid6: using algorithm avx512x4 gen() 18310 MB/s Dec 13 14:32:49.843993 kernel: raid6: .... xor() 8159 MB/s, rmw enabled Dec 13 14:32:49.848944 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:32:49.870753 kernel: xor: automatically using best checksumming function avx Dec 13 14:32:49.966756 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:32:49.974666 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:32:49.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:49.978000 audit: BPF prog-id=7 op=LOAD Dec 13 14:32:49.978000 audit: BPF prog-id=8 op=LOAD Dec 13 14:32:49.979810 systemd[1]: Starting systemd-udevd.service... Dec 13 14:32:49.994011 systemd-udevd[384]: Using default interface naming scheme 'v252'. Dec 13 14:32:49.998668 systemd[1]: Started systemd-udevd.service. Dec 13 14:32:50.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:50.007874 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:32:50.023285 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation Dec 13 14:32:50.052878 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:32:50.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:50.058446 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:32:50.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:50.093295 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:32:50.149751 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:32:50.153748 kernel: hv_vmbus: Vmbus version:5.2 Dec 13 14:32:50.175751 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:32:50.193763 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:32:50.215864 kernel: AES CTR mode by8 optimization enabled Dec 13 14:32:50.215918 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 14:32:50.216750 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:32:50.223549 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:32:50.229775 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:32:50.236249 kernel: scsi host1: storvsc_host_t Dec 13 14:32:50.236508 kernel: scsi host0: storvsc_host_t Dec 13 14:32:50.249611 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:32:50.249679 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:32:50.271746 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:32:50.291063 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 14:32:50.291106 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:32:50.291747 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:32:50.298409 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:32:50.298422 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:32:50.316452 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:32:50.337907 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:32:50.338089 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:32:50.338259 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:32:50.338409 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:32:50.338573 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:32:50.338591 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:32:50.359754 kernel: hv_netvsc 6045bdde-4477-6045-bdde-44776045bdde eth0: VF slot 1 added Dec 13 14:32:50.371279 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:32:50.380697 kernel: hv_pci 244bca60-3368-4030-8b87-78efae3df447: PCI VMBus probing: Using version 0x10004 Dec 13 14:32:50.476066 kernel: hv_pci 244bca60-3368-4030-8b87-78efae3df447: PCI host bridge to bus 3368:00 Dec 13 14:32:50.476236 kernel: pci_bus 3368:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Dec 13 14:32:50.476407 kernel: pci_bus 3368:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:32:50.476564 kernel: pci 3368:00:02.0: [15b3:1016] type 00 class 0x020000 Dec 13 14:32:50.476756 kernel: pci 3368:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:32:50.476927 kernel: pci 3368:00:02.0: enabling Extended Tags Dec 13 14:32:50.477089 kernel: pci 3368:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 3368:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Dec 13 14:32:50.477250 kernel: pci_bus 3368:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:32:50.477397 kernel: pci 3368:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:32:50.477553 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (440) Dec 13 14:32:50.483299 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:32:50.501140 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:32:50.561223 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:32:50.568898 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:32:50.575628 systemd[1]: Starting disk-uuid.service... Dec 13 14:32:50.608757 kernel: mlx5_core 3368:00:02.0: firmware version: 14.30.5000 Dec 13 14:32:50.881104 kernel: mlx5_core 3368:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 14:32:50.881287 kernel: mlx5_core 3368:00:02.0: Supported tc offload range - chains: 1, prios: 1 Dec 13 14:32:50.881448 kernel: mlx5_core 3368:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Dec 13 14:32:50.881603 kernel: hv_netvsc 6045bdde-4477-6045-bdde-44776045bdde eth0: VF registering: eth1 Dec 13 14:32:50.881772 kernel: mlx5_core 3368:00:02.0 eth1: joined to eth0 Dec 13 14:32:50.628590 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:32:50.889767 kernel: mlx5_core 3368:00:02.0 enP13160s1: renamed from eth1 Dec 13 14:32:51.606756 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:32:51.606829 disk-uuid[552]: The operation has completed successfully. Dec 13 14:32:51.675451 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:32:51.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:51.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:51.675557 systemd[1]: Finished disk-uuid.service. Dec 13 14:32:51.694525 systemd[1]: Starting verity-setup.service... Dec 13 14:32:51.721755 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:32:51.799014 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:32:51.805862 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:32:51.808370 systemd[1]: Finished verity-setup.service. Dec 13 14:32:51.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:51.883285 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:32:51.882229 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:32:51.884349 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:32:51.885091 systemd[1]: Starting ignition-setup.service... Dec 13 14:32:51.898578 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:32:51.916753 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:32:51.916799 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:32:51.916814 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:32:51.948498 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:32:51.972444 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:32:51.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:51.977000 audit: BPF prog-id=9 op=LOAD Dec 13 14:32:51.979064 systemd[1]: Starting systemd-networkd.service... Dec 13 14:32:51.988025 systemd[1]: Finished ignition-setup.service. Dec 13 14:32:51.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:51.991424 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:32:52.014055 systemd-networkd[836]: lo: Link UP Dec 13 14:32:52.015211 systemd-networkd[836]: lo: Gained carrier Dec 13 14:32:52.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:52.015708 systemd-networkd[836]: Enumeration completed Dec 13 14:32:52.015791 systemd[1]: Started systemd-networkd.service. Dec 13 14:32:52.018181 systemd[1]: Reached target network.target. Dec 13 14:32:52.023093 systemd[1]: Starting iscsiuio.service... Dec 13 14:32:52.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:52.031144 systemd[1]: Started iscsiuio.service. Dec 13 14:32:52.035014 systemd-networkd[836]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:32:52.040778 systemd[1]: Starting iscsid.service... Dec 13 14:32:52.048634 iscsid[843]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:32:52.048634 iscsid[843]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:32:52.048634 iscsid[843]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:32:52.048634 iscsid[843]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:32:52.048634 iscsid[843]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:32:52.048634 iscsid[843]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:32:52.048634 iscsid[843]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:32:52.048697 systemd[1]: Started iscsid.service. Dec 13 14:32:52.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:52.082706 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:32:52.101309 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:32:52.115758 kernel: mlx5_core 3368:00:02.0 enP13160s1: Link up Dec 13 14:32:52.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:52.104225 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:32:52.106703 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:32:52.109258 systemd[1]: Reached target remote-fs.target. Dec 13 14:32:52.112353 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:32:52.127842 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:32:52.140749 kernel: hv_netvsc 6045bdde-4477-6045-bdde-44776045bdde eth0: Data path switched to VF: enP13160s1 Dec 13 14:32:52.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:52.146623 systemd-networkd[836]: enP13160s1: Link UP Dec 13 14:32:52.148612 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:32:52.148769 systemd-networkd[836]: eth0: Link UP Dec 13 14:32:52.150717 systemd-networkd[836]: eth0: Gained carrier Dec 13 14:32:52.156890 systemd-networkd[836]: enP13160s1: Gained carrier Dec 13 14:32:52.177797 systemd-networkd[836]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:32:52.841173 ignition[838]: Ignition 2.14.0 Dec 13 14:32:52.841187 ignition[838]: Stage: fetch-offline Dec 13 14:32:52.841259 ignition[838]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:52.841301 ignition[838]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:52.877027 ignition[838]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:52.880551 ignition[838]: parsed url from cmdline: "" Dec 13 14:32:52.880563 ignition[838]: no config URL provided Dec 13 14:32:52.880573 ignition[838]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:32:52.880588 ignition[838]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:32:52.880602 ignition[838]: failed to fetch config: resource requires networking Dec 13 14:32:52.887699 ignition[838]: Ignition finished successfully Dec 13 14:32:52.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:52.889464 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:32:52.893707 systemd[1]: Starting ignition-fetch.service... Dec 13 14:32:52.906358 ignition[862]: Ignition 2.14.0 Dec 13 14:32:52.906368 ignition[862]: Stage: fetch Dec 13 14:32:52.906508 ignition[862]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:52.906538 ignition[862]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:52.910430 ignition[862]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:52.910624 ignition[862]: parsed url from cmdline: "" Dec 13 14:32:52.910629 ignition[862]: no config URL provided Dec 13 14:32:52.910638 ignition[862]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:32:52.910647 ignition[862]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:32:52.910679 ignition[862]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:32:52.987142 ignition[862]: GET result: OK Dec 13 14:32:52.987241 ignition[862]: config has been read from IMDS userdata Dec 13 14:32:52.987263 ignition[862]: parsing config with SHA512: a7a130aa126e7edd12429ec93cc3cf9d1558b2832bd74152299656e555553f7478e84c8a6bbb8ee19813c98e837aa372cf4cce679680c178a253c24ffd9bde55 Dec 13 14:32:52.990788 unknown[862]: fetched base config from "system" Dec 13 14:32:52.991324 ignition[862]: fetch: fetch complete Dec 13 14:32:52.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:52.990798 unknown[862]: fetched base config from "system" Dec 13 14:32:52.991332 ignition[862]: fetch: fetch passed Dec 13 14:32:52.990804 unknown[862]: fetched user config from "azure" Dec 13 14:32:52.991388 ignition[862]: Ignition finished successfully Dec 13 14:32:52.993105 systemd[1]: Finished ignition-fetch.service. Dec 13 14:32:53.010242 ignition[868]: Ignition 2.14.0 Dec 13 14:32:52.998612 systemd[1]: Starting ignition-kargs.service... Dec 13 14:32:53.010251 ignition[868]: Stage: kargs Dec 13 14:32:53.010365 ignition[868]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:53.018759 systemd[1]: Finished ignition-kargs.service. Dec 13 14:32:53.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:53.010390 ignition[868]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:53.015900 ignition[868]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:53.017672 ignition[868]: kargs: kargs passed Dec 13 14:32:53.017744 ignition[868]: Ignition finished successfully Dec 13 14:32:53.033367 systemd[1]: Starting ignition-disks.service... Dec 13 14:32:53.041428 ignition[874]: Ignition 2.14.0 Dec 13 14:32:53.041438 ignition[874]: Stage: disks Dec 13 14:32:53.041580 ignition[874]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:53.041615 ignition[874]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:53.047506 systemd[1]: Finished ignition-disks.service. Dec 13 14:32:53.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:53.045479 ignition[874]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:53.050482 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:32:53.046716 ignition[874]: disks: disks passed Dec 13 14:32:53.054620 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:32:53.046785 ignition[874]: Ignition finished successfully Dec 13 14:32:53.056690 systemd[1]: Reached target local-fs.target. Dec 13 14:32:53.058982 systemd[1]: Reached target sysinit.target. Dec 13 14:32:53.060920 systemd[1]: Reached target basic.target. Dec 13 14:32:53.063694 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:32:53.091380 systemd-fsck[882]: ROOT: clean, 621/7326000 files, 481077/7359488 blocks Dec 13 14:32:53.098070 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:32:53.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:53.100708 systemd[1]: Mounting sysroot.mount... Dec 13 14:32:53.157751 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:32:53.157879 systemd[1]: Mounted sysroot.mount. Dec 13 14:32:53.161803 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:32:53.173703 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:32:53.179899 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:32:53.180953 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:32:53.181004 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:32:53.195102 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:32:53.209765 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:32:53.215898 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:32:53.225107 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (892) Dec 13 14:32:53.237837 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:32:53.237897 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:32:53.237909 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:32:53.237923 initrd-setup-root[897]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:32:53.246511 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:32:53.251203 initrd-setup-root[923]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:32:53.260849 initrd-setup-root[931]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:32:53.265614 initrd-setup-root[939]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:32:53.790454 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:32:53.819251 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:32:53.819282 kernel: audit: type=1130 audit(1734100373.793:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:53.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:53.808799 systemd[1]: Starting ignition-mount.service... Dec 13 14:32:53.813269 systemd[1]: Starting sysroot-boot.service... Dec 13 14:32:53.825700 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:32:53.825840 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:32:53.929300 systemd[1]: Finished sysroot-boot.service. Dec 13 14:32:53.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:53.946780 kernel: audit: type=1130 audit(1734100373.931:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:54.003297 ignition[961]: INFO : Ignition 2.14.0 Dec 13 14:32:54.003297 ignition[961]: INFO : Stage: mount Dec 13 14:32:54.008230 ignition[961]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:54.008230 ignition[961]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:54.030668 kernel: audit: type=1130 audit(1734100374.014:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:54.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:54.030748 ignition[961]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:54.030748 ignition[961]: INFO : mount: mount passed Dec 13 14:32:54.030748 ignition[961]: INFO : Ignition finished successfully Dec 13 14:32:54.012071 systemd[1]: Finished ignition-mount.service. Dec 13 14:32:54.166022 systemd-networkd[836]: eth0: Gained IPv6LL Dec 13 14:32:54.302588 coreos-metadata[891]: Dec 13 14:32:54.302 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:32:54.344249 coreos-metadata[891]: Dec 13 14:32:54.344 INFO Fetch successful Dec 13 14:32:54.379802 coreos-metadata[891]: Dec 13 14:32:54.379 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:32:54.397258 coreos-metadata[891]: Dec 13 14:32:54.397 INFO Fetch successful Dec 13 14:32:54.406267 coreos-metadata[891]: Dec 13 14:32:54.406 INFO wrote hostname ci-3510.3.6-a-da29b84149 to /sysroot/etc/hostname Dec 13 14:32:54.412322 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:32:54.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:54.428754 kernel: audit: type=1130 audit(1734100374.414:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:54.429100 systemd[1]: Starting ignition-files.service... Dec 13 14:32:54.436685 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:32:54.448062 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (970) Dec 13 14:32:54.457230 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:32:54.457259 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:32:54.457273 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:32:54.465385 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:32:54.479238 ignition[989]: INFO : Ignition 2.14.0 Dec 13 14:32:54.479238 ignition[989]: INFO : Stage: files Dec 13 14:32:54.483284 ignition[989]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:54.483284 ignition[989]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:54.497352 ignition[989]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:54.504926 ignition[989]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:32:54.508470 ignition[989]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:32:54.508470 ignition[989]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:32:54.524310 ignition[989]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:32:54.529694 ignition[989]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:32:54.529694 ignition[989]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:32:54.528673 unknown[989]: wrote ssh authorized keys file for user: core Dec 13 14:32:54.539914 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:32:54.539914 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:32:54.539914 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:32:54.539914 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:32:54.539914 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:32:54.539914 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:32:54.539914 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:32:54.539914 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:32:54.587586 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (994) Dec 13 14:32:54.556991 systemd[1]: mnt-oem1959819794.mount: Deactivated successfully. Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1959819794" Dec 13 14:32:54.590379 ignition[989]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1959819794": device or resource busy Dec 13 14:32:54.590379 ignition[989]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1959819794", trying btrfs: device or resource busy Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1959819794" Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1959819794" Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1959819794" Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1959819794" Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1619331935" Dec 13 14:32:54.590379 ignition[989]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1619331935": device or resource busy Dec 13 14:32:54.590379 ignition[989]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1619331935", trying btrfs: device or resource busy Dec 13 14:32:54.590379 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1619331935" Dec 13 14:32:54.574607 systemd[1]: mnt-oem1619331935.mount: Deactivated successfully. Dec 13 14:32:54.669291 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1619331935" Dec 13 14:32:54.669291 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1619331935" Dec 13 14:32:54.669291 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1619331935" Dec 13 14:32:54.669291 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:32:54.669291 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:32:54.669291 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:32:55.130713 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 14:32:55.552442 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:32:55.552442 ignition[989]: INFO : files: op(f): [started] processing unit "waagent.service" Dec 13 14:32:55.552442 ignition[989]: INFO : files: op(f): [finished] processing unit "waagent.service" Dec 13 14:32:55.552442 ignition[989]: INFO : files: op(10): [started] processing unit "nvidia.service" Dec 13 14:32:55.552442 ignition[989]: INFO : files: op(10): [finished] processing unit "nvidia.service" Dec 13 14:32:55.552442 ignition[989]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Dec 13 14:32:55.587161 kernel: audit: type=1130 audit(1734100375.569:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.567143 systemd[1]: Finished ignition-files.service. Dec 13 14:32:55.587615 ignition[989]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Dec 13 14:32:55.587615 ignition[989]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Dec 13 14:32:55.587615 ignition[989]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:32:55.587615 ignition[989]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:32:55.587615 ignition[989]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:32:55.587615 ignition[989]: INFO : files: files passed Dec 13 14:32:55.587615 ignition[989]: INFO : Ignition finished successfully Dec 13 14:32:55.583232 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:32:55.619242 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:32:55.620375 systemd[1]: Starting ignition-quench.service... Dec 13 14:32:55.632087 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:32:55.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.632172 systemd[1]: Finished ignition-quench.service. Dec 13 14:32:55.662808 kernel: audit: type=1130 audit(1734100375.634:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.662852 kernel: audit: type=1131 audit(1734100375.634:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.662928 initrd-setup-root-after-ignition[1015]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:32:55.681570 kernel: audit: type=1130 audit(1734100375.663:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.649628 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:32:55.663906 systemd[1]: Reached target ignition-complete.target. Dec 13 14:32:55.687132 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:32:55.705571 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:32:55.706766 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:32:55.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.712747 systemd[1]: Reached target initrd-fs.target. Dec 13 14:32:55.741617 kernel: audit: type=1130 audit(1734100375.712:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.741648 kernel: audit: type=1131 audit(1734100375.712:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.737810 systemd[1]: Reached target initrd.target. Dec 13 14:32:55.741649 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:32:55.742516 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:32:55.757059 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:32:55.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.763938 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:32:55.778123 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:32:55.782365 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:32:55.787031 systemd[1]: Stopped target timers.target. Dec 13 14:32:55.791145 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:32:55.793785 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:32:55.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.798045 systemd[1]: Stopped target initrd.target. Dec 13 14:32:55.802085 systemd[1]: Stopped target basic.target. Dec 13 14:32:55.806016 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:32:55.810690 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:32:55.815560 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:32:55.820233 systemd[1]: Stopped target remote-fs.target. Dec 13 14:32:55.824769 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:32:55.829386 systemd[1]: Stopped target sysinit.target. Dec 13 14:32:55.833327 systemd[1]: Stopped target local-fs.target. Dec 13 14:32:55.837365 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:32:55.841812 systemd[1]: Stopped target swap.target. Dec 13 14:32:55.845740 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:32:55.848326 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:32:55.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.853202 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:32:55.859985 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:32:55.862503 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:32:55.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.866867 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:32:55.870021 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:32:55.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.875265 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:32:55.877810 systemd[1]: Stopped ignition-files.service. Dec 13 14:32:55.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.882028 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:32:55.884933 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:32:55.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.897791 iscsid[843]: iscsid shutting down. Dec 13 14:32:55.890932 systemd[1]: Stopping ignition-mount.service... Dec 13 14:32:55.902843 ignition[1028]: INFO : Ignition 2.14.0 Dec 13 14:32:55.902843 ignition[1028]: INFO : Stage: umount Dec 13 14:32:55.902843 ignition[1028]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:55.902843 ignition[1028]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:55.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.900432 systemd[1]: Stopping iscsid.service... Dec 13 14:32:55.924319 ignition[1028]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:55.924319 ignition[1028]: INFO : umount: umount passed Dec 13 14:32:55.924319 ignition[1028]: INFO : Ignition finished successfully Dec 13 14:32:55.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.908718 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:32:55.908873 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:32:55.915335 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:32:55.928801 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:32:55.928947 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:32:55.932890 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:32:55.933048 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:32:55.959210 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:32:55.962009 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:32:55.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.962097 systemd[1]: Stopped iscsid.service. Dec 13 14:32:55.964456 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:32:55.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.964531 systemd[1]: Stopped ignition-mount.service. Dec 13 14:32:55.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.969389 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:32:55.969482 systemd[1]: Stopped ignition-disks.service. Dec 13 14:32:55.973676 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:32:55.973716 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:32:55.978209 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:32:55.978256 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:32:56.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.980447 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:32:55.980488 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:32:55.984781 systemd[1]: Stopped target paths.target. Dec 13 14:32:56.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.986790 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:32:56.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:55.992768 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:32:55.996206 systemd[1]: Stopped target slices.target. Dec 13 14:32:55.998121 systemd[1]: Stopped target sockets.target. Dec 13 14:32:56.001955 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:32:56.002001 systemd[1]: Closed iscsid.socket. Dec 13 14:32:56.006158 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:32:56.006209 systemd[1]: Stopped ignition-setup.service. Dec 13 14:32:56.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.012927 systemd[1]: Stopping iscsiuio.service... Dec 13 14:32:56.017063 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:32:56.017156 systemd[1]: Stopped iscsiuio.service. Dec 13 14:32:56.055000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:32:56.020789 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:32:56.020870 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:32:56.026312 systemd[1]: Stopped target network.target. Dec 13 14:32:56.030009 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:32:56.030050 systemd[1]: Closed iscsiuio.socket. Dec 13 14:32:56.033824 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:32:56.036792 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:32:56.045846 systemd-networkd[836]: eth0: DHCPv6 lease lost Dec 13 14:32:56.046113 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:32:56.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.046217 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:32:56.084000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:32:56.068028 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:32:56.071902 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:32:56.083909 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:32:56.083945 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:32:56.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.091934 systemd[1]: Stopping network-cleanup.service... Dec 13 14:32:56.098317 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:32:56.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.098388 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:32:56.102777 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:32:56.102878 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:32:56.110347 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:32:56.110390 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:32:56.118360 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:32:56.131366 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:32:56.134998 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:32:56.137485 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:32:56.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.142472 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:32:56.142551 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:32:56.147720 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:32:56.147780 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:32:56.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.152043 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:32:56.154661 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:32:56.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.158928 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:32:56.158977 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:32:56.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.165184 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:32:56.165232 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:32:56.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.176878 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:32:56.179357 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:32:56.197578 kernel: hv_netvsc 6045bdde-4477-6045-bdde-44776045bdde eth0: Data path switched from VF: enP13160s1 Dec 13 14:32:56.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:56.179420 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:32:56.183398 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:32:56.183480 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:32:56.217237 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:32:56.217359 systemd[1]: Stopped network-cleanup.service. Dec 13 14:32:56.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:57.639288 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:32:57.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:57.639430 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:32:57.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:57.642153 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:32:57.647436 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:32:57.647502 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:32:57.650661 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:32:57.664632 systemd[1]: Switching root. Dec 13 14:32:57.690983 systemd-journald[183]: Journal stopped Dec 13 14:33:06.887861 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Dec 13 14:33:06.887909 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:33:06.887928 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:33:06.887947 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:33:06.887961 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:33:06.887978 kernel: SELinux: policy capability open_perms=1 Dec 13 14:33:06.888002 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:33:06.888017 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:33:06.888033 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:33:06.888051 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:33:06.888068 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:33:06.888085 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:33:06.888102 systemd[1]: Successfully loaded SELinux policy in 127.058ms. Dec 13 14:33:06.888120 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.759ms. Dec 13 14:33:06.888145 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:33:06.888164 systemd[1]: Detected virtualization microsoft. Dec 13 14:33:06.888181 systemd[1]: Detected architecture x86-64. Dec 13 14:33:06.888199 systemd[1]: Detected first boot. Dec 13 14:33:06.888225 systemd[1]: Hostname set to . Dec 13 14:33:06.888246 systemd[1]: Initializing machine ID from random generator. Dec 13 14:33:06.888262 kernel: kauditd_printk_skb: 38 callbacks suppressed Dec 13 14:33:06.888280 kernel: audit: type=1400 audit(1734100378.941:82): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:33:06.888299 kernel: audit: type=1400 audit(1734100378.960:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:33:06.888316 kernel: audit: type=1400 audit(1734100378.960:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:33:06.888341 kernel: audit: type=1334 audit(1734100378.973:85): prog-id=10 op=LOAD Dec 13 14:33:06.888356 kernel: audit: type=1334 audit(1734100378.973:86): prog-id=10 op=UNLOAD Dec 13 14:33:06.888375 kernel: audit: type=1334 audit(1734100378.986:87): prog-id=11 op=LOAD Dec 13 14:33:06.888391 kernel: audit: type=1334 audit(1734100378.986:88): prog-id=11 op=UNLOAD Dec 13 14:33:06.888410 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:33:06.888427 kernel: audit: type=1400 audit(1734100379.989:89): avc: denied { associate } for pid=1061 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:33:06.888447 kernel: audit: type=1300 audit(1734100379.989:89): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1044 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:06.888466 kernel: audit: type=1327 audit(1734100379.989:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:33:06.888486 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:33:06.888505 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:33:06.888523 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:33:06.888545 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:33:06.888560 kernel: kauditd_printk_skb: 6 callbacks suppressed Dec 13 14:33:06.888572 kernel: audit: type=1334 audit(1734100386.412:91): prog-id=12 op=LOAD Dec 13 14:33:06.888585 kernel: audit: type=1334 audit(1734100386.412:92): prog-id=3 op=UNLOAD Dec 13 14:33:06.888601 kernel: audit: type=1334 audit(1734100386.417:93): prog-id=13 op=LOAD Dec 13 14:33:06.888619 kernel: audit: type=1334 audit(1734100386.422:94): prog-id=14 op=LOAD Dec 13 14:33:06.888633 kernel: audit: type=1334 audit(1734100386.422:95): prog-id=4 op=UNLOAD Dec 13 14:33:06.888647 kernel: audit: type=1334 audit(1734100386.422:96): prog-id=5 op=UNLOAD Dec 13 14:33:06.888660 kernel: audit: type=1334 audit(1734100386.427:97): prog-id=15 op=LOAD Dec 13 14:33:06.888674 kernel: audit: type=1334 audit(1734100386.427:98): prog-id=12 op=UNLOAD Dec 13 14:33:06.888688 kernel: audit: type=1334 audit(1734100386.432:99): prog-id=16 op=LOAD Dec 13 14:33:06.888702 kernel: audit: type=1334 audit(1734100386.437:100): prog-id=17 op=LOAD Dec 13 14:33:06.888716 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:33:06.888749 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:33:06.888764 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:33:06.888775 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:33:06.888787 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:33:06.888797 systemd[1]: Created slice system-getty.slice. Dec 13 14:33:06.888809 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:33:06.888821 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:33:06.888834 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:33:06.888845 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:33:06.888856 systemd[1]: Created slice user.slice. Dec 13 14:33:06.888869 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:33:06.888878 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:33:06.888892 systemd[1]: Set up automount boot.automount. Dec 13 14:33:06.888902 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:33:06.888912 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:33:06.888923 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:33:06.888936 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:33:06.888948 systemd[1]: Reached target integritysetup.target. Dec 13 14:33:06.888960 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:33:06.888971 systemd[1]: Reached target remote-fs.target. Dec 13 14:33:06.888983 systemd[1]: Reached target slices.target. Dec 13 14:33:06.888993 systemd[1]: Reached target swap.target. Dec 13 14:33:06.889006 systemd[1]: Reached target torcx.target. Dec 13 14:33:06.889015 systemd[1]: Reached target veritysetup.target. Dec 13 14:33:06.889030 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:33:06.889041 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:33:06.889051 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:33:06.889062 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:33:06.889076 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:33:06.889089 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:33:06.889099 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:33:06.889111 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:33:06.889122 systemd[1]: Mounting media.mount... Dec 13 14:33:06.889134 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:06.889144 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:33:06.889156 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:33:06.889168 systemd[1]: Mounting tmp.mount... Dec 13 14:33:06.889180 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:33:06.889193 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:33:06.889203 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:33:06.889216 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:33:06.889225 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:33:06.889238 systemd[1]: Starting modprobe@drm.service... Dec 13 14:33:06.889251 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:33:06.889261 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:33:06.889272 systemd[1]: Starting modprobe@loop.service... Dec 13 14:33:06.889286 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:33:06.889298 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:33:06.889308 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:33:06.889320 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:33:06.889330 kernel: fuse: init (API version 7.34) Dec 13 14:33:06.889340 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:33:06.889351 kernel: loop: module loaded Dec 13 14:33:06.889360 systemd[1]: Stopped systemd-journald.service. Dec 13 14:33:06.889372 systemd[1]: Starting systemd-journald.service... Dec 13 14:33:06.889387 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:33:06.889397 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:33:06.889407 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:33:06.889418 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:33:06.889431 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:33:06.889440 systemd[1]: Stopped verity-setup.service. Dec 13 14:33:06.889457 systemd-journald[1172]: Journal started Dec 13 14:33:06.889508 systemd-journald[1172]: Runtime Journal (/run/log/journal/1fec5867b7694010bab027857d1eaf13) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:32:58.717000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:32:58.941000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:32:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:32:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:32:58.973000 audit: BPF prog-id=10 op=LOAD Dec 13 14:32:58.973000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:32:58.986000 audit: BPF prog-id=11 op=LOAD Dec 13 14:32:58.986000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:32:59.989000 audit[1061]: AVC avc: denied { associate } for pid=1061 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:32:59.989000 audit[1061]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1044 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:59.989000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:32:59.999000 audit[1061]: AVC avc: denied { associate } for pid=1061 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:32:59.999000 audit[1061]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1044 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:59.999000 audit: CWD cwd="/" Dec 13 14:32:59.999000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:59.999000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:59.999000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:33:06.412000 audit: BPF prog-id=12 op=LOAD Dec 13 14:33:06.412000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:33:06.417000 audit: BPF prog-id=13 op=LOAD Dec 13 14:33:06.422000 audit: BPF prog-id=14 op=LOAD Dec 13 14:33:06.422000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:33:06.422000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:33:06.427000 audit: BPF prog-id=15 op=LOAD Dec 13 14:33:06.427000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:33:06.432000 audit: BPF prog-id=16 op=LOAD Dec 13 14:33:06.437000 audit: BPF prog-id=17 op=LOAD Dec 13 14:33:06.437000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:33:06.437000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:33:06.442000 audit: BPF prog-id=18 op=LOAD Dec 13 14:33:06.442000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:33:06.468000 audit: BPF prog-id=19 op=LOAD Dec 13 14:33:06.468000 audit: BPF prog-id=20 op=LOAD Dec 13 14:33:06.468000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:33:06.468000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:33:06.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.480000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:33:06.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.834000 audit: BPF prog-id=21 op=LOAD Dec 13 14:33:06.834000 audit: BPF prog-id=22 op=LOAD Dec 13 14:33:06.835000 audit: BPF prog-id=23 op=LOAD Dec 13 14:33:06.835000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:33:06.835000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:33:06.884000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:33:06.884000 audit[1172]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd3a8ea6f0 a2=4000 a3=7ffd3a8ea78c items=0 ppid=1 pid=1172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:06.884000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:33:06.411263 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:32:59.981342 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:33:06.469294 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:32:59.981725 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:32:59.981772 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:32:59.981811 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:32:59.981823 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:32:59.981872 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:32:59.981888 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:32:59.982106 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:32:59.982163 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:32:59.982181 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:32:59.986408 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:32:59.986441 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:32:59.986459 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:32:59.986473 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:32:59.986488 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:32:59.986500 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:32:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:33:05.881434 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:33:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:33:05.881671 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:33:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:33:05.881797 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:33:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:33:05.881963 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:33:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:33:05.882010 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:33:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:33:05.882065 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-12-13T14:33:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:33:06.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.904020 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:06.910748 systemd[1]: Started systemd-journald.service. Dec 13 14:33:06.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.912342 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:33:06.914491 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:33:06.916503 systemd[1]: Mounted media.mount. Dec 13 14:33:06.918416 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:33:06.920625 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:33:06.923034 systemd[1]: Mounted tmp.mount. Dec 13 14:33:06.925026 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:33:06.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.927565 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:33:06.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.930279 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:33:06.930508 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:33:06.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.933151 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:33:06.933339 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:33:06.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.935869 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:33:06.936005 systemd[1]: Finished modprobe@drm.service. Dec 13 14:33:06.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.938423 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:33:06.938572 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:33:06.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.941198 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:33:06.941333 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:33:06.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.944077 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:33:06.944211 systemd[1]: Finished modprobe@loop.service. Dec 13 14:33:06.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.946860 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:33:06.949905 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:33:06.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.952612 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:33:06.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.955511 systemd[1]: Reached target network-pre.target. Dec 13 14:33:06.959374 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:33:06.967486 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:33:06.969925 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:33:06.978258 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:33:06.982180 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:33:06.984498 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:33:06.985847 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:33:06.988180 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:33:06.989622 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:33:06.993858 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:33:07.000562 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:33:07.003432 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:33:07.005880 systemd-journald[1172]: Time spent on flushing to /var/log/journal/1fec5867b7694010bab027857d1eaf13 is 34.742ms for 1143 entries. Dec 13 14:33:07.005880 systemd-journald[1172]: System Journal (/var/log/journal/1fec5867b7694010bab027857d1eaf13) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:33:07.088742 systemd-journald[1172]: Received client request to flush runtime journal. Dec 13 14:33:07.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.037955 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:33:07.089179 udevadm[1187]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:33:07.043815 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:33:07.047592 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:33:07.050123 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:33:07.052386 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:33:07.089765 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:33:07.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.174522 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:33:07.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.606785 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:33:07.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.609000 audit: BPF prog-id=24 op=LOAD Dec 13 14:33:07.609000 audit: BPF prog-id=25 op=LOAD Dec 13 14:33:07.609000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:33:07.609000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:33:07.611206 systemd[1]: Starting systemd-udevd.service... Dec 13 14:33:07.630763 systemd-udevd[1189]: Using default interface naming scheme 'v252'. Dec 13 14:33:07.690606 systemd[1]: Started systemd-udevd.service. Dec 13 14:33:07.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.693000 audit: BPF prog-id=26 op=LOAD Dec 13 14:33:07.698006 systemd[1]: Starting systemd-networkd.service... Dec 13 14:33:07.731000 audit: BPF prog-id=27 op=LOAD Dec 13 14:33:07.731000 audit: BPF prog-id=28 op=LOAD Dec 13 14:33:07.731000 audit: BPF prog-id=29 op=LOAD Dec 13 14:33:07.733417 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:33:07.762124 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:33:07.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.793576 systemd[1]: Started systemd-userdbd.service. Dec 13 14:33:07.804748 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:33:07.836000 audit[1197]: AVC avc: denied { confidentiality } for pid=1197 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:33:07.851824 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:33:07.864840 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:33:07.865020 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:33:07.876709 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:33:07.876818 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:33:07.876845 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:33:08.704099 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:33:08.715603 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:33:08.715675 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:33:08.724005 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:33:08.734788 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:33:08.743103 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:33:07.836000 audit[1197]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561b685e5650 a1=f884 a2=7f154f198bc5 a3=5 items=12 ppid=1189 pid=1197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:07.836000 audit: CWD cwd="/" Dec 13 14:33:07.836000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=1 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=2 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=3 name=(null) inode=14676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=4 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=5 name=(null) inode=14677 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=6 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=7 name=(null) inode=14678 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=8 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=9 name=(null) inode=14679 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=10 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PATH item=11 name=(null) inode=14680 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:07.836000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:33:08.782728 systemd-networkd[1195]: lo: Link UP Dec 13 14:33:08.783032 systemd-networkd[1195]: lo: Gained carrier Dec 13 14:33:08.784523 systemd-networkd[1195]: Enumeration completed Dec 13 14:33:08.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:08.784765 systemd[1]: Started systemd-networkd.service. Dec 13 14:33:08.789137 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:33:08.789771 systemd-networkd[1195]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:33:08.809102 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1205) Dec 13 14:33:08.851110 kernel: mlx5_core 3368:00:02.0 enP13160s1: Link up Dec 13 14:33:08.873199 kernel: hv_netvsc 6045bdde-4477-6045-bdde-44776045bdde eth0: Data path switched to VF: enP13160s1 Dec 13 14:33:08.875394 systemd-networkd[1195]: enP13160s1: Link UP Dec 13 14:33:08.875556 systemd-networkd[1195]: eth0: Link UP Dec 13 14:33:08.875562 systemd-networkd[1195]: eth0: Gained carrier Dec 13 14:33:08.885446 systemd-networkd[1195]: enP13160s1: Gained carrier Dec 13 14:33:08.897807 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:33:08.958248 systemd-networkd[1195]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:33:08.990128 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Dec 13 14:33:09.029462 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:33:09.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.033569 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:33:09.114718 lvm[1267]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:33:09.137407 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:33:09.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.140378 systemd[1]: Reached target cryptsetup.target. Dec 13 14:33:09.144821 systemd[1]: Starting lvm2-activation.service... Dec 13 14:33:09.149554 lvm[1268]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:33:09.170113 systemd[1]: Finished lvm2-activation.service. Dec 13 14:33:09.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.172696 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:33:09.175100 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:33:09.175136 systemd[1]: Reached target local-fs.target. Dec 13 14:33:09.177351 systemd[1]: Reached target machines.target. Dec 13 14:33:09.180702 systemd[1]: Starting ldconfig.service... Dec 13 14:33:09.183144 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:33:09.183244 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:09.184404 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:33:09.187605 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:33:09.191393 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:33:09.195397 systemd[1]: Starting systemd-sysext.service... Dec 13 14:33:09.201931 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1270 (bootctl) Dec 13 14:33:09.203361 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:33:09.304064 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:33:09.411093 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:33:09.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.668687 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:33:09.668893 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:33:09.691104 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:33:09.720103 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:33:09.738112 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:33:09.742006 (sd-sysext)[1282]: Using extensions 'kubernetes'. Dec 13 14:33:09.742449 (sd-sysext)[1282]: Merged extensions into '/usr'. Dec 13 14:33:09.758161 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:09.759828 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:33:09.762508 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:33:09.764896 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:33:09.768531 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:33:09.772191 systemd[1]: Starting modprobe@loop.service... Dec 13 14:33:09.774414 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:33:09.774604 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:09.774772 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:09.777745 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:33:09.780251 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:33:09.780407 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:33:09.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.783190 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:33:09.783328 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:33:09.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.787212 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:33:09.787340 systemd[1]: Finished modprobe@loop.service. Dec 13 14:33:09.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.790180 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:33:09.790323 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:33:09.791700 systemd[1]: Finished systemd-sysext.service. Dec 13 14:33:09.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.795451 systemd[1]: Starting ensure-sysext.service... Dec 13 14:33:09.797718 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:33:09.809632 systemd[1]: Reloading. Dec 13 14:33:09.854201 systemd-tmpfiles[1289]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:33:09.886519 systemd-tmpfiles[1289]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:33:09.891612 systemd-fsck[1278]: fsck.fat 4.2 (2021-01-31) Dec 13 14:33:09.891612 systemd-fsck[1278]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:33:09.907073 /usr/lib/systemd/system-generators/torcx-generator[1308]: time="2024-12-13T14:33:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:33:09.907121 /usr/lib/systemd/system-generators/torcx-generator[1308]: time="2024-12-13T14:33:09Z" level=info msg="torcx already run" Dec 13 14:33:09.930614 systemd-tmpfiles[1289]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:33:09.997112 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:33:09.997133 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:33:10.015047 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:33:10.089218 systemd-networkd[1195]: eth0: Gained IPv6LL Dec 13 14:33:10.099002 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:33:10.101000 audit: BPF prog-id=30 op=LOAD Dec 13 14:33:10.101000 audit: BPF prog-id=31 op=LOAD Dec 13 14:33:10.101000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:33:10.101000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:33:10.102000 audit: BPF prog-id=32 op=LOAD Dec 13 14:33:10.102000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:33:10.103000 audit: BPF prog-id=33 op=LOAD Dec 13 14:33:10.103000 audit: BPF prog-id=34 op=LOAD Dec 13 14:33:10.103000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:33:10.103000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:33:10.104000 audit: BPF prog-id=35 op=LOAD Dec 13 14:33:10.104000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:33:10.105000 audit: BPF prog-id=36 op=LOAD Dec 13 14:33:10.105000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:33:10.105000 audit: BPF prog-id=37 op=LOAD Dec 13 14:33:10.105000 audit: BPF prog-id=38 op=LOAD Dec 13 14:33:10.105000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:33:10.105000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:33:10.110945 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:33:10.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.114088 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:33:10.116819 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:33:10.127790 systemd[1]: Mounting boot.mount... Dec 13 14:33:10.134724 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:10.135065 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:33:10.137052 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:33:10.141349 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:33:10.145162 systemd[1]: Starting modprobe@loop.service... Dec 13 14:33:10.147136 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:33:10.147435 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:10.147719 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:10.151304 systemd[1]: Mounted boot.mount. Dec 13 14:33:10.154372 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:33:10.154518 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:33:10.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.157407 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:33:10.157567 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:33:10.160353 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:33:10.160504 systemd[1]: Finished modprobe@loop.service. Dec 13 14:33:10.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.170236 systemd[1]: Finished ensure-sysext.service. Dec 13 14:33:10.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.174473 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:33:10.176148 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:33:10.179712 systemd[1]: Starting modprobe@drm.service... Dec 13 14:33:10.184527 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:33:10.187815 systemd[1]: Starting modprobe@loop.service... Dec 13 14:33:10.189954 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:33:10.190058 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:10.191018 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:33:10.191236 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:33:10.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.193726 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:33:10.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.193899 systemd[1]: Finished modprobe@drm.service. Dec 13 14:33:10.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.196475 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:33:10.196622 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:33:10.199417 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:33:10.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.199578 systemd[1]: Finished modprobe@loop.service. Dec 13 14:33:10.202499 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:33:10.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.205246 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:33:10.205312 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:33:10.272050 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:33:10.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.276341 systemd[1]: Starting audit-rules.service... Dec 13 14:33:10.279940 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:33:10.283885 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:33:10.289000 audit: BPF prog-id=39 op=LOAD Dec 13 14:33:10.291548 systemd[1]: Starting systemd-resolved.service... Dec 13 14:33:10.293000 audit: BPF prog-id=40 op=LOAD Dec 13 14:33:10.295744 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:33:10.301435 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:33:10.314028 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:33:10.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.316974 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:33:10.316000 audit[1394]: SYSTEM_BOOT pid=1394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.329032 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:33:10.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.362111 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:33:10.401000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:33:10.401000 audit[1403]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffcb572900 a2=420 a3=0 items=0 ppid=1383 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:10.401000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:33:10.403485 augenrules[1403]: No rules Dec 13 14:33:10.403802 systemd[1]: Finished audit-rules.service. Dec 13 14:33:10.414156 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:33:10.416820 systemd[1]: Reached target time-set.target. Dec 13 14:33:10.435530 systemd-resolved[1387]: Positive Trust Anchors: Dec 13 14:33:10.435803 systemd-resolved[1387]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:33:10.435880 systemd-resolved[1387]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:33:10.457757 systemd-resolved[1387]: Using system hostname 'ci-3510.3.6-a-da29b84149'. Dec 13 14:33:10.459317 systemd[1]: Started systemd-resolved.service. Dec 13 14:33:10.462150 systemd[1]: Reached target network.target. Dec 13 14:33:10.464594 systemd[1]: Reached target network-online.target. Dec 13 14:33:10.467046 systemd[1]: Reached target nss-lookup.target. Dec 13 14:33:10.503430 systemd-timesyncd[1393]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). Dec 13 14:33:10.503605 systemd-timesyncd[1393]: Initial clock synchronization to Fri 2024-12-13 14:33:10.502920 UTC. Dec 13 14:33:10.667737 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:10.667774 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:11.290130 ldconfig[1269]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:33:11.303876 systemd[1]: Finished ldconfig.service. Dec 13 14:33:11.308333 systemd[1]: Starting systemd-update-done.service... Dec 13 14:33:11.316637 systemd[1]: Finished systemd-update-done.service. Dec 13 14:33:11.319366 systemd[1]: Reached target sysinit.target. Dec 13 14:33:11.321674 systemd[1]: Started motdgen.path. Dec 13 14:33:11.323638 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:33:11.326812 systemd[1]: Started logrotate.timer. Dec 13 14:33:11.328797 systemd[1]: Started mdadm.timer. Dec 13 14:33:11.330661 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:33:11.332872 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:33:11.332907 systemd[1]: Reached target paths.target. Dec 13 14:33:11.334846 systemd[1]: Reached target timers.target. Dec 13 14:33:11.338131 systemd[1]: Listening on dbus.socket. Dec 13 14:33:11.341330 systemd[1]: Starting docker.socket... Dec 13 14:33:11.348771 systemd[1]: Listening on sshd.socket. Dec 13 14:33:11.350908 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:11.351383 systemd[1]: Listening on docker.socket. Dec 13 14:33:11.353464 systemd[1]: Reached target sockets.target. Dec 13 14:33:11.355548 systemd[1]: Reached target basic.target. Dec 13 14:33:11.357508 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:33:11.357540 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:33:11.358545 systemd[1]: Starting containerd.service... Dec 13 14:33:11.362046 systemd[1]: Starting dbus.service... Dec 13 14:33:11.365489 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:33:11.368988 systemd[1]: Starting extend-filesystems.service... Dec 13 14:33:11.371068 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:33:11.372540 systemd[1]: Starting kubelet.service... Dec 13 14:33:11.377513 systemd[1]: Starting motdgen.service... Dec 13 14:33:11.385293 systemd[1]: Started nvidia.service. Dec 13 14:33:11.388721 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:33:11.392692 systemd[1]: Starting sshd-keygen.service... Dec 13 14:33:11.423329 jq[1414]: false Dec 13 14:33:11.397837 systemd[1]: Starting systemd-logind.service... Dec 13 14:33:11.401313 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:11.401425 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:33:11.401961 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:33:11.402872 systemd[1]: Starting update-engine.service... Dec 13 14:33:11.406199 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:33:11.412131 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:33:11.412381 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:33:11.439808 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:33:11.440023 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:33:11.446950 jq[1427]: true Dec 13 14:33:11.462511 jq[1438]: true Dec 13 14:33:11.467798 extend-filesystems[1415]: Found loop1 Dec 13 14:33:11.473166 extend-filesystems[1415]: Found sda Dec 13 14:33:11.476353 extend-filesystems[1415]: Found sda1 Dec 13 14:33:11.478370 extend-filesystems[1415]: Found sda2 Dec 13 14:33:11.481299 extend-filesystems[1415]: Found sda3 Dec 13 14:33:11.481299 extend-filesystems[1415]: Found usr Dec 13 14:33:11.481299 extend-filesystems[1415]: Found sda4 Dec 13 14:33:11.481299 extend-filesystems[1415]: Found sda6 Dec 13 14:33:11.481299 extend-filesystems[1415]: Found sda7 Dec 13 14:33:11.481299 extend-filesystems[1415]: Found sda9 Dec 13 14:33:11.481299 extend-filesystems[1415]: Checking size of /dev/sda9 Dec 13 14:33:11.503125 systemd[1]: Started dbus.service. Dec 13 14:33:11.547427 env[1430]: time="2024-12-13T14:33:11.531233639Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:33:11.547652 extend-filesystems[1415]: Old size kept for /dev/sda9 Dec 13 14:33:11.547652 extend-filesystems[1415]: Found sr0 Dec 13 14:33:11.502824 dbus-daemon[1413]: [system] SELinux support is enabled Dec 13 14:33:11.512040 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:33:11.512073 systemd[1]: Reached target system-config.target. Dec 13 14:33:11.514650 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:33:11.514672 systemd[1]: Reached target user-config.target. Dec 13 14:33:11.532499 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:33:11.532701 systemd[1]: Finished motdgen.service. Dec 13 14:33:11.539758 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:33:11.539935 systemd[1]: Finished extend-filesystems.service. Dec 13 14:33:11.624760 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:33:11.627195 bash[1472]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:33:11.627911 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:33:11.647906 systemd-logind[1424]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:33:11.652184 systemd-logind[1424]: New seat seat0. Dec 13 14:33:11.658714 systemd[1]: Started systemd-logind.service. Dec 13 14:33:11.663721 env[1430]: time="2024-12-13T14:33:11.663673672Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:33:11.666296 env[1430]: time="2024-12-13T14:33:11.666266914Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:11.669143 env[1430]: time="2024-12-13T14:33:11.669104560Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:33:11.669256 env[1430]: time="2024-12-13T14:33:11.669240262Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:11.669612 env[1430]: time="2024-12-13T14:33:11.669588668Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:33:11.669693 env[1430]: time="2024-12-13T14:33:11.669679369Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:11.669768 env[1430]: time="2024-12-13T14:33:11.669753870Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:33:11.669827 env[1430]: time="2024-12-13T14:33:11.669815371Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:11.669967 env[1430]: time="2024-12-13T14:33:11.669952474Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:11.670299 env[1430]: time="2024-12-13T14:33:11.670278579Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:11.670564 env[1430]: time="2024-12-13T14:33:11.670542683Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:33:11.670644 env[1430]: time="2024-12-13T14:33:11.670630885Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:33:11.670766 env[1430]: time="2024-12-13T14:33:11.670749086Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:33:11.670839 env[1430]: time="2024-12-13T14:33:11.670826588Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:33:11.685507 env[1430]: time="2024-12-13T14:33:11.685466423Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:33:11.685608 env[1430]: time="2024-12-13T14:33:11.685521324Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:33:11.685608 env[1430]: time="2024-12-13T14:33:11.685538525Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:33:11.685608 env[1430]: time="2024-12-13T14:33:11.685585225Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:33:11.685608 env[1430]: time="2024-12-13T14:33:11.685605226Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:33:11.685773 env[1430]: time="2024-12-13T14:33:11.685623926Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:33:11.685773 env[1430]: time="2024-12-13T14:33:11.685691227Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:33:11.685773 env[1430]: time="2024-12-13T14:33:11.685710127Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:33:11.685773 env[1430]: time="2024-12-13T14:33:11.685729728Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:33:11.685773 env[1430]: time="2024-12-13T14:33:11.685762128Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:33:11.685950 env[1430]: time="2024-12-13T14:33:11.685781329Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:33:11.685950 env[1430]: time="2024-12-13T14:33:11.685798929Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:33:11.686023 env[1430]: time="2024-12-13T14:33:11.685952431Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:33:11.686099 env[1430]: time="2024-12-13T14:33:11.686073233Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:33:11.686512 env[1430]: time="2024-12-13T14:33:11.686473640Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:33:11.686587 env[1430]: time="2024-12-13T14:33:11.686527341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.686587 env[1430]: time="2024-12-13T14:33:11.686546741Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:33:11.686666 env[1430]: time="2024-12-13T14:33:11.686616342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.686666 env[1430]: time="2024-12-13T14:33:11.686636642Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687337 env[1430]: time="2024-12-13T14:33:11.687309053Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687408 env[1430]: time="2024-12-13T14:33:11.687345354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687408 env[1430]: time="2024-12-13T14:33:11.687379254Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687408 env[1430]: time="2024-12-13T14:33:11.687397755Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687519 env[1430]: time="2024-12-13T14:33:11.687414455Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687519 env[1430]: time="2024-12-13T14:33:11.687430855Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687519 env[1430]: time="2024-12-13T14:33:11.687452855Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:33:11.687633 env[1430]: time="2024-12-13T14:33:11.687599858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687633 env[1430]: time="2024-12-13T14:33:11.687622058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687707 env[1430]: time="2024-12-13T14:33:11.687640159Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.687707 env[1430]: time="2024-12-13T14:33:11.687657159Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:33:11.687707 env[1430]: time="2024-12-13T14:33:11.687677359Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:33:11.687707 env[1430]: time="2024-12-13T14:33:11.687695359Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:33:11.687842 env[1430]: time="2024-12-13T14:33:11.687724760Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:33:11.687842 env[1430]: time="2024-12-13T14:33:11.687765561Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:33:11.688125 env[1430]: time="2024-12-13T14:33:11.688019365Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:33:11.688125 env[1430]: time="2024-12-13T14:33:11.688110666Z" level=info msg="Connect containerd service" Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.688157167Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.688887879Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.689867794Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.689925995Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.689989296Z" level=info msg="containerd successfully booted in 0.159611s" Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.691828626Z" level=info msg="Start subscribing containerd event" Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.691878427Z" level=info msg="Start recovering state" Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.691942928Z" level=info msg="Start event monitor" Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.691963028Z" level=info msg="Start snapshots syncer" Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.691974428Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:33:11.699044 env[1430]: time="2024-12-13T14:33:11.691984928Z" level=info msg="Start streaming server" Dec 13 14:33:11.690065 systemd[1]: Started containerd.service. Dec 13 14:33:11.729800 update_engine[1425]: I1213 14:33:11.729262 1425 main.cc:92] Flatcar Update Engine starting Dec 13 14:33:11.744843 systemd[1]: Started update-engine.service. Dec 13 14:33:11.750045 systemd[1]: Started locksmithd.service. Dec 13 14:33:11.753599 update_engine[1425]: I1213 14:33:11.753465 1425 update_check_scheduler.cc:74] Next update check in 5m55s Dec 13 14:33:12.368272 locksmithd[1516]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:33:12.499131 systemd[1]: Started kubelet.service. Dec 13 14:33:13.146717 kubelet[1529]: E1213 14:33:13.146674 1529 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:13.149141 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:13.149302 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:13.149609 systemd[1]: kubelet.service: Consumed 1.163s CPU time. Dec 13 14:33:14.216313 sshd_keygen[1449]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:33:14.236068 systemd[1]: Finished sshd-keygen.service. Dec 13 14:33:14.240770 systemd[1]: Starting issuegen.service... Dec 13 14:33:14.244699 systemd[1]: Started waagent.service. Dec 13 14:33:14.248358 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:33:14.248545 systemd[1]: Finished issuegen.service. Dec 13 14:33:14.252455 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:33:14.261469 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:33:14.265953 systemd[1]: Started getty@tty1.service. Dec 13 14:33:14.269798 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:33:14.278652 systemd[1]: Reached target getty.target. Dec 13 14:33:14.280732 systemd[1]: Reached target multi-user.target. Dec 13 14:33:14.286514 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:33:14.302257 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:33:14.302440 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:33:14.305300 systemd[1]: Startup finished in 567ms (firmware) + 7.820s (loader) + 1.000s (kernel) + 9.811s (initrd) + 14.960s (userspace) = 34.160s. Dec 13 14:33:14.398062 login[1549]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 14:33:14.398490 login[1548]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:33:14.418377 systemd[1]: Created slice user-500.slice. Dec 13 14:33:14.419976 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:33:14.422836 systemd-logind[1424]: New session 1 of user core. Dec 13 14:33:14.436562 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:33:14.438338 systemd[1]: Starting user@500.service... Dec 13 14:33:14.442451 (systemd)[1552]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:14.560200 systemd[1552]: Queued start job for default target default.target. Dec 13 14:33:14.560796 systemd[1552]: Reached target paths.target. Dec 13 14:33:14.560825 systemd[1552]: Reached target sockets.target. Dec 13 14:33:14.560842 systemd[1552]: Reached target timers.target. Dec 13 14:33:14.560857 systemd[1552]: Reached target basic.target. Dec 13 14:33:14.560908 systemd[1552]: Reached target default.target. Dec 13 14:33:14.560944 systemd[1552]: Startup finished in 112ms. Dec 13 14:33:14.560983 systemd[1]: Started user@500.service. Dec 13 14:33:14.562332 systemd[1]: Started session-1.scope. Dec 13 14:33:15.400963 login[1549]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:33:15.406135 systemd-logind[1424]: New session 2 of user core. Dec 13 14:33:15.406759 systemd[1]: Started session-2.scope. Dec 13 14:33:16.138075 waagent[1543]: 2024-12-13T14:33:16.137947Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:33:16.143758 waagent[1543]: 2024-12-13T14:33:16.143675Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:33:16.144695 waagent[1543]: 2024-12-13T14:33:16.144637Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:33:16.146058 waagent[1543]: 2024-12-13T14:33:16.145999Z INFO Daemon Daemon Run daemon Dec 13 14:33:16.147419 waagent[1543]: 2024-12-13T14:33:16.147367Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:33:16.163374 waagent[1543]: 2024-12-13T14:33:16.163243Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:33:16.172321 waagent[1543]: 2024-12-13T14:33:16.172199Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.173849Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.174698Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.176205Z INFO Daemon Daemon Activate resource disk Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.176718Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.184475Z INFO Daemon Daemon Found device: None Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.185315Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.186241Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.188035Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.189152Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.199122Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.202281Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.203214Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:33:16.218492 waagent[1543]: 2024-12-13T14:33:16.204091Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:33:16.251126 waagent[1543]: 2024-12-13T14:33:16.250979Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:33:16.287267 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:33:16.299000 waagent[1543]: 2024-12-13T14:33:16.298869Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:33:16.302127 waagent[1543]: 2024-12-13T14:33:16.302036Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:33:16.305671 waagent[1543]: 2024-12-13T14:33:16.305596Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:33:16.309101 waagent[1543]: 2024-12-13T14:33:16.309005Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:33:16.312101 waagent[1543]: 2024-12-13T14:33:16.312021Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:33:16.314728 waagent[1543]: 2024-12-13T14:33:16.314667Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:33:16.354370 waagent[1543]: 2024-12-13T14:33:16.354295Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:33:16.358661 waagent[1543]: 2024-12-13T14:33:16.358609Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:33:16.364809 waagent[1543]: 2024-12-13T14:33:16.360174Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:33:19.517920 waagent[1543]: 2024-12-13T14:33:19.517744Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:33:19.531481 waagent[1543]: 2024-12-13T14:33:19.531390Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:33:19.534972 waagent[1543]: 2024-12-13T14:33:19.534895Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:33:19.609679 waagent[1543]: 2024-12-13T14:33:19.609540Z INFO Daemon Daemon Found private key matching thumbprint 8476AFDA8B9E06AE2F789D48B026DCD33A73983C Dec 13 14:33:19.621108 waagent[1543]: 2024-12-13T14:33:19.611120Z INFO Daemon Daemon Certificate with thumbprint E6D9250239E91B582C3E363311B55EDECA8A20E1 has no matching private key. Dec 13 14:33:19.621108 waagent[1543]: 2024-12-13T14:33:19.612182Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:33:19.642066 waagent[1543]: 2024-12-13T14:33:19.641978Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 2dc3f4b3-b9af-44ff-98fd-b79c6ed5ac74 New eTag: 14627872712154043257] Dec 13 14:33:19.649412 waagent[1543]: 2024-12-13T14:33:19.649304Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:33:19.664244 waagent[1543]: 2024-12-13T14:33:19.664146Z INFO Daemon Daemon Starting provisioning Dec 13 14:33:19.667629 waagent[1543]: 2024-12-13T14:33:19.667518Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:33:19.670574 waagent[1543]: 2024-12-13T14:33:19.670481Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-da29b84149] Dec 13 14:33:19.682504 waagent[1543]: 2024-12-13T14:33:19.682375Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-da29b84149] Dec 13 14:33:19.686663 waagent[1543]: 2024-12-13T14:33:19.686566Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:33:19.692187 waagent[1543]: 2024-12-13T14:33:19.692094Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:33:19.714821 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:33:19.715179 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:33:19.715267 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:33:19.715613 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:33:19.721136 systemd-networkd[1195]: eth0: DHCPv6 lease lost Dec 13 14:33:19.723032 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:33:19.723250 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:33:19.728147 systemd[1]: Starting systemd-networkd.service... Dec 13 14:33:19.761364 systemd-networkd[1599]: enP13160s1: Link UP Dec 13 14:33:19.761375 systemd-networkd[1599]: enP13160s1: Gained carrier Dec 13 14:33:19.762680 systemd-networkd[1599]: eth0: Link UP Dec 13 14:33:19.762690 systemd-networkd[1599]: eth0: Gained carrier Dec 13 14:33:19.763132 systemd-networkd[1599]: lo: Link UP Dec 13 14:33:19.763140 systemd-networkd[1599]: lo: Gained carrier Dec 13 14:33:19.763450 systemd-networkd[1599]: eth0: Gained IPv6LL Dec 13 14:33:19.763723 systemd-networkd[1599]: Enumeration completed Dec 13 14:33:19.763837 systemd[1]: Started systemd-networkd.service. Dec 13 14:33:19.765995 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:33:19.774318 waagent[1543]: 2024-12-13T14:33:19.770653Z INFO Daemon Daemon Create user account if not exists Dec 13 14:33:19.774318 waagent[1543]: 2024-12-13T14:33:19.772471Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:33:19.774318 waagent[1543]: 2024-12-13T14:33:19.773271Z INFO Daemon Daemon Configure sudoer Dec 13 14:33:19.774696 waagent[1543]: 2024-12-13T14:33:19.774641Z INFO Daemon Daemon Configure sshd Dec 13 14:33:19.775631 waagent[1543]: 2024-12-13T14:33:19.775581Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:33:19.778564 systemd-networkd[1599]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:33:19.812188 systemd-networkd[1599]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:33:19.817311 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:33:20.872383 waagent[1543]: 2024-12-13T14:33:20.872269Z INFO Daemon Daemon Provisioning complete Dec 13 14:33:20.888893 waagent[1543]: 2024-12-13T14:33:20.888816Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:33:20.892298 waagent[1543]: 2024-12-13T14:33:20.892225Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:33:20.898337 waagent[1543]: 2024-12-13T14:33:20.898250Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:33:21.165427 waagent[1608]: 2024-12-13T14:33:21.165240Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:33:21.166166 waagent[1608]: 2024-12-13T14:33:21.166099Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:33:21.166324 waagent[1608]: 2024-12-13T14:33:21.166270Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:33:21.177596 waagent[1608]: 2024-12-13T14:33:21.177518Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:33:21.177761 waagent[1608]: 2024-12-13T14:33:21.177710Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:33:21.240237 waagent[1608]: 2024-12-13T14:33:21.240107Z INFO ExtHandler ExtHandler Found private key matching thumbprint 8476AFDA8B9E06AE2F789D48B026DCD33A73983C Dec 13 14:33:21.240469 waagent[1608]: 2024-12-13T14:33:21.240409Z INFO ExtHandler ExtHandler Certificate with thumbprint E6D9250239E91B582C3E363311B55EDECA8A20E1 has no matching private key. Dec 13 14:33:21.240700 waagent[1608]: 2024-12-13T14:33:21.240653Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:33:21.254306 waagent[1608]: 2024-12-13T14:33:21.254240Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 8977e7f7-db68-4008-8ac0-e108be225863 New eTag: 14627872712154043257] Dec 13 14:33:21.254838 waagent[1608]: 2024-12-13T14:33:21.254779Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:33:21.286346 waagent[1608]: 2024-12-13T14:33:21.286223Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:33:21.295096 waagent[1608]: 2024-12-13T14:33:21.294998Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1608 Dec 13 14:33:21.298526 waagent[1608]: 2024-12-13T14:33:21.298454Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:33:21.299750 waagent[1608]: 2024-12-13T14:33:21.299691Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:33:21.331837 waagent[1608]: 2024-12-13T14:33:21.331772Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:33:21.332263 waagent[1608]: 2024-12-13T14:33:21.332197Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:33:21.340430 waagent[1608]: 2024-12-13T14:33:21.340375Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:33:21.340894 waagent[1608]: 2024-12-13T14:33:21.340836Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:33:21.341967 waagent[1608]: 2024-12-13T14:33:21.341902Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:33:21.343248 waagent[1608]: 2024-12-13T14:33:21.343190Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:33:21.344509 waagent[1608]: 2024-12-13T14:33:21.344452Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:33:21.344673 waagent[1608]: 2024-12-13T14:33:21.344622Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:33:21.345241 waagent[1608]: 2024-12-13T14:33:21.345181Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:33:21.345397 waagent[1608]: 2024-12-13T14:33:21.345348Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:33:21.345502 waagent[1608]: 2024-12-13T14:33:21.345455Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:33:21.345915 waagent[1608]: 2024-12-13T14:33:21.345863Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:33:21.346224 waagent[1608]: 2024-12-13T14:33:21.346172Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:33:21.346542 waagent[1608]: 2024-12-13T14:33:21.346486Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:33:21.346781 waagent[1608]: 2024-12-13T14:33:21.346731Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:33:21.347374 waagent[1608]: 2024-12-13T14:33:21.347317Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:33:21.347874 waagent[1608]: 2024-12-13T14:33:21.347822Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:33:21.348452 waagent[1608]: 2024-12-13T14:33:21.348397Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:33:21.348653 waagent[1608]: 2024-12-13T14:33:21.348603Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:33:21.348843 waagent[1608]: 2024-12-13T14:33:21.348778Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:33:21.352279 waagent[1608]: 2024-12-13T14:33:21.352222Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:33:21.352279 waagent[1608]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:33:21.352279 waagent[1608]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:33:21.352279 waagent[1608]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:33:21.352279 waagent[1608]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:33:21.352279 waagent[1608]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:33:21.352279 waagent[1608]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:33:21.367903 waagent[1608]: 2024-12-13T14:33:21.367723Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:33:21.369358 waagent[1608]: 2024-12-13T14:33:21.369293Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:33:21.371447 waagent[1608]: 2024-12-13T14:33:21.371371Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:33:21.378138 waagent[1608]: 2024-12-13T14:33:21.378064Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1599' Dec 13 14:33:21.413132 waagent[1608]: 2024-12-13T14:33:21.412976Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:33:21.413132 waagent[1608]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:33:21.413132 waagent[1608]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:33:21.413132 waagent[1608]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:44:77 brd ff:ff:ff:ff:ff:ff Dec 13 14:33:21.413132 waagent[1608]: 3: enP13160s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:44:77 brd ff:ff:ff:ff:ff:ff\ altname enP13160p0s2 Dec 13 14:33:21.413132 waagent[1608]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:33:21.413132 waagent[1608]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:33:21.413132 waagent[1608]: 2: eth0 inet 10.200.8.15/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:33:21.413132 waagent[1608]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:33:21.413132 waagent[1608]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:33:21.413132 waagent[1608]: 2: eth0 inet6 fe80::6245:bdff:fede:4477/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:33:21.423672 waagent[1608]: 2024-12-13T14:33:21.423541Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:33:21.555043 waagent[1608]: 2024-12-13T14:33:21.554935Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Dec 13 14:33:21.558104 waagent[1608]: 2024-12-13T14:33:21.557991Z INFO EnvHandler ExtHandler Firewall rules: Dec 13 14:33:21.558104 waagent[1608]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:33:21.558104 waagent[1608]: pkts bytes target prot opt in out source destination Dec 13 14:33:21.558104 waagent[1608]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:33:21.558104 waagent[1608]: pkts bytes target prot opt in out source destination Dec 13 14:33:21.558104 waagent[1608]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:33:21.558104 waagent[1608]: pkts bytes target prot opt in out source destination Dec 13 14:33:21.558104 waagent[1608]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:33:21.558104 waagent[1608]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:33:21.559405 waagent[1608]: 2024-12-13T14:33:21.559354Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:33:21.680518 waagent[1608]: 2024-12-13T14:33:21.680389Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:33:21.901899 waagent[1543]: 2024-12-13T14:33:21.901713Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:33:21.907954 waagent[1543]: 2024-12-13T14:33:21.907893Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:33:22.936279 waagent[1646]: 2024-12-13T14:33:22.936168Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:33:22.936974 waagent[1646]: 2024-12-13T14:33:22.936907Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:33:22.937132 waagent[1646]: 2024-12-13T14:33:22.937065Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:33:22.937282 waagent[1646]: 2024-12-13T14:33:22.937235Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Dec 13 14:33:22.946764 waagent[1646]: 2024-12-13T14:33:22.946657Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:33:22.947167 waagent[1646]: 2024-12-13T14:33:22.947105Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:33:22.947330 waagent[1646]: 2024-12-13T14:33:22.947282Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:33:22.961809 waagent[1646]: 2024-12-13T14:33:22.961734Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:33:22.970640 waagent[1646]: 2024-12-13T14:33:22.970573Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:33:22.971564 waagent[1646]: 2024-12-13T14:33:22.971504Z INFO ExtHandler Dec 13 14:33:22.971710 waagent[1646]: 2024-12-13T14:33:22.971658Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: e7e18170-96e8-4d22-95dd-52bddf042d57 eTag: 14627872712154043257 source: Fabric] Dec 13 14:33:22.972418 waagent[1646]: 2024-12-13T14:33:22.972362Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:33:22.973498 waagent[1646]: 2024-12-13T14:33:22.973440Z INFO ExtHandler Dec 13 14:33:22.973631 waagent[1646]: 2024-12-13T14:33:22.973583Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:33:22.980802 waagent[1646]: 2024-12-13T14:33:22.980751Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:33:22.981243 waagent[1646]: 2024-12-13T14:33:22.981197Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:33:23.004014 waagent[1646]: 2024-12-13T14:33:23.003948Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:33:23.072941 waagent[1646]: 2024-12-13T14:33:23.072807Z INFO ExtHandler Downloaded certificate {'thumbprint': 'E6D9250239E91B582C3E363311B55EDECA8A20E1', 'hasPrivateKey': False} Dec 13 14:33:23.073960 waagent[1646]: 2024-12-13T14:33:23.073891Z INFO ExtHandler Downloaded certificate {'thumbprint': '8476AFDA8B9E06AE2F789D48B026DCD33A73983C', 'hasPrivateKey': True} Dec 13 14:33:23.074940 waagent[1646]: 2024-12-13T14:33:23.074877Z INFO ExtHandler Fetch goal state completed Dec 13 14:33:23.095756 waagent[1646]: 2024-12-13T14:33:23.095652Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:33:23.107217 waagent[1646]: 2024-12-13T14:33:23.107124Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1646 Dec 13 14:33:23.110275 waagent[1646]: 2024-12-13T14:33:23.110211Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:33:23.111256 waagent[1646]: 2024-12-13T14:33:23.111198Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:33:23.111543 waagent[1646]: 2024-12-13T14:33:23.111489Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:33:23.113514 waagent[1646]: 2024-12-13T14:33:23.113456Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:33:23.118462 waagent[1646]: 2024-12-13T14:33:23.118407Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:33:23.118833 waagent[1646]: 2024-12-13T14:33:23.118777Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:33:23.127163 waagent[1646]: 2024-12-13T14:33:23.127109Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:33:23.127678 waagent[1646]: 2024-12-13T14:33:23.127619Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:33:23.140331 waagent[1646]: 2024-12-13T14:33:23.140235Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Dec 13 14:33:23.143072 waagent[1646]: 2024-12-13T14:33:23.142974Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Dec 13 14:33:23.144124 waagent[1646]: 2024-12-13T14:33:23.144031Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:33:23.145564 waagent[1646]: 2024-12-13T14:33:23.145502Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:33:23.146160 waagent[1646]: 2024-12-13T14:33:23.146065Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:33:23.146608 waagent[1646]: 2024-12-13T14:33:23.146556Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:33:23.146768 waagent[1646]: 2024-12-13T14:33:23.146720Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:33:23.147381 waagent[1646]: 2024-12-13T14:33:23.147327Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:33:23.148096 waagent[1646]: 2024-12-13T14:33:23.148020Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:33:23.148291 waagent[1646]: 2024-12-13T14:33:23.148240Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:33:23.148580 waagent[1646]: 2024-12-13T14:33:23.148526Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:33:23.148815 waagent[1646]: 2024-12-13T14:33:23.148763Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:33:23.148815 waagent[1646]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:33:23.148815 waagent[1646]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:33:23.148815 waagent[1646]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:33:23.148815 waagent[1646]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:33:23.148815 waagent[1646]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:33:23.148815 waagent[1646]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:33:23.149067 waagent[1646]: 2024-12-13T14:33:23.149014Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:33:23.149832 waagent[1646]: 2024-12-13T14:33:23.149777Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:33:23.151550 waagent[1646]: 2024-12-13T14:33:23.151444Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:33:23.151975 waagent[1646]: 2024-12-13T14:33:23.151912Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:33:23.157957 waagent[1646]: 2024-12-13T14:33:23.157870Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:33:23.162160 waagent[1646]: 2024-12-13T14:33:23.157570Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:33:23.170768 waagent[1646]: 2024-12-13T14:33:23.164785Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:33:23.170768 waagent[1646]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:33:23.170768 waagent[1646]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:33:23.170768 waagent[1646]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:44:77 brd ff:ff:ff:ff:ff:ff Dec 13 14:33:23.170768 waagent[1646]: 3: enP13160s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:44:77 brd ff:ff:ff:ff:ff:ff\ altname enP13160p0s2 Dec 13 14:33:23.170768 waagent[1646]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:33:23.170768 waagent[1646]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:33:23.170768 waagent[1646]: 2: eth0 inet 10.200.8.15/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:33:23.170768 waagent[1646]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:33:23.170768 waagent[1646]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:33:23.170768 waagent[1646]: 2: eth0 inet6 fe80::6245:bdff:fede:4477/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:33:23.165774 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:33:23.166117 systemd[1]: Stopped kubelet.service. Dec 13 14:33:23.166166 systemd[1]: kubelet.service: Consumed 1.163s CPU time. Dec 13 14:33:23.168100 systemd[1]: Starting kubelet.service... Dec 13 14:33:23.171808 waagent[1646]: 2024-12-13T14:33:23.169453Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:33:23.200729 waagent[1646]: 2024-12-13T14:33:23.200574Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:33:23.266496 waagent[1646]: 2024-12-13T14:33:23.266389Z INFO ExtHandler ExtHandler Dec 13 14:33:23.267170 waagent[1646]: 2024-12-13T14:33:23.267071Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: f839e22f-89bd-4451-a554-55536ba8b8c7 correlation ef9d20c0-b47d-45a8-8599-f36bf87dcec2 created: 2024-12-13T14:32:29.523735Z] Dec 13 14:33:23.268795 waagent[1646]: 2024-12-13T14:33:23.268721Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:33:23.281736 waagent[1646]: 2024-12-13T14:33:23.281628Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:33:23.281736 waagent[1646]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:33:23.281736 waagent[1646]: pkts bytes target prot opt in out source destination Dec 13 14:33:23.281736 waagent[1646]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:33:23.281736 waagent[1646]: pkts bytes target prot opt in out source destination Dec 13 14:33:23.281736 waagent[1646]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:33:23.281736 waagent[1646]: pkts bytes target prot opt in out source destination Dec 13 14:33:23.281736 waagent[1646]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:33:23.281736 waagent[1646]: 141 15781 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:33:23.281736 waagent[1646]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:33:23.286993 waagent[1646]: 2024-12-13T14:33:23.286924Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 20 ms] Dec 13 14:33:23.303431 systemd[1]: Started kubelet.service. Dec 13 14:33:23.310671 waagent[1646]: 2024-12-13T14:33:23.310599Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:33:23.329320 waagent[1646]: 2024-12-13T14:33:23.329226Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 1A5EBADE-A6F0-40DC-86EC-08289F21A166;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:33:23.831992 kubelet[1691]: E1213 14:33:23.831937 1691 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:23.835517 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:23.835710 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:34.086725 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:33:34.087011 systemd[1]: Stopped kubelet.service. Dec 13 14:33:34.088756 systemd[1]: Starting kubelet.service... Dec 13 14:33:34.570356 systemd[1]: Started kubelet.service. Dec 13 14:33:34.722098 kubelet[1703]: E1213 14:33:34.722047 1703 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:34.723907 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:34.724065 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:44.847232 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:33:44.847575 systemd[1]: Stopped kubelet.service. Dec 13 14:33:44.849602 systemd[1]: Starting kubelet.service... Dec 13 14:33:45.185155 systemd[1]: Started kubelet.service. Dec 13 14:33:45.528125 kubelet[1714]: E1213 14:33:45.527989 1714 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:45.529726 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:45.529879 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:55.597174 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:33:55.597480 systemd[1]: Stopped kubelet.service. Dec 13 14:33:55.599482 systemd[1]: Starting kubelet.service... Dec 13 14:33:55.861779 systemd[1]: Started kubelet.service. Dec 13 14:33:56.278840 kubelet[1724]: E1213 14:33:56.278718 1724 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:56.280413 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:56.280570 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:56.569346 update_engine[1425]: I1213 14:33:56.569213 1425 update_attempter.cc:509] Updating boot flags... Dec 13 14:33:56.856781 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Dec 13 14:34:06.347014 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:34:06.347365 systemd[1]: Stopped kubelet.service. Dec 13 14:34:06.349358 systemd[1]: Starting kubelet.service... Dec 13 14:34:06.677688 systemd[1]: Started kubelet.service. Dec 13 14:34:06.845807 systemd[1]: Created slice system-sshd.slice. Dec 13 14:34:06.847377 systemd[1]: Started sshd@0-10.200.8.15:22-10.200.16.10:49756.service. Dec 13 14:34:07.024332 kubelet[1800]: E1213 14:34:07.024225 1800 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:34:07.026042 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:34:07.026198 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:34:07.749999 sshd[1809]: Accepted publickey for core from 10.200.16.10 port 49756 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:34:07.751489 sshd[1809]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:07.756368 systemd[1]: Started session-3.scope. Dec 13 14:34:07.757097 systemd-logind[1424]: New session 3 of user core. Dec 13 14:34:08.362707 systemd[1]: Started sshd@1-10.200.8.15:22-10.200.16.10:49772.service. Dec 13 14:34:09.067462 sshd[1814]: Accepted publickey for core from 10.200.16.10 port 49772 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:34:09.068921 sshd[1814]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:09.073212 systemd-logind[1424]: New session 4 of user core. Dec 13 14:34:09.073854 systemd[1]: Started session-4.scope. Dec 13 14:34:09.569964 sshd[1814]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:09.572721 systemd[1]: sshd@1-10.200.8.15:22-10.200.16.10:49772.service: Deactivated successfully. Dec 13 14:34:09.573593 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:34:09.574214 systemd-logind[1424]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:34:09.574953 systemd-logind[1424]: Removed session 4. Dec 13 14:34:09.688942 systemd[1]: Started sshd@2-10.200.8.15:22-10.200.16.10:54282.service. Dec 13 14:34:10.394578 sshd[1823]: Accepted publickey for core from 10.200.16.10 port 54282 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:34:10.396277 sshd[1823]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:10.401844 systemd[1]: Started session-5.scope. Dec 13 14:34:10.402746 systemd-logind[1424]: New session 5 of user core. Dec 13 14:34:10.891138 sshd[1823]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:10.894418 systemd[1]: sshd@2-10.200.8.15:22-10.200.16.10:54282.service: Deactivated successfully. Dec 13 14:34:10.895387 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:34:10.896181 systemd-logind[1424]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:34:10.897074 systemd-logind[1424]: Removed session 5. Dec 13 14:34:11.009651 systemd[1]: Started sshd@3-10.200.8.15:22-10.200.16.10:54286.service. Dec 13 14:34:11.715202 sshd[1829]: Accepted publickey for core from 10.200.16.10 port 54286 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:34:11.716818 sshd[1829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:11.721862 systemd[1]: Started session-6.scope. Dec 13 14:34:11.722667 systemd-logind[1424]: New session 6 of user core. Dec 13 14:34:12.219030 sshd[1829]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:12.222283 systemd[1]: sshd@3-10.200.8.15:22-10.200.16.10:54286.service: Deactivated successfully. Dec 13 14:34:12.223189 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:34:12.223796 systemd-logind[1424]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:34:12.224568 systemd-logind[1424]: Removed session 6. Dec 13 14:34:12.338366 systemd[1]: Started sshd@4-10.200.8.15:22-10.200.16.10:54296.service. Dec 13 14:34:13.046536 sshd[1835]: Accepted publickey for core from 10.200.16.10 port 54296 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:34:13.048255 sshd[1835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:13.053410 systemd[1]: Started session-7.scope. Dec 13 14:34:13.054108 systemd-logind[1424]: New session 7 of user core. Dec 13 14:34:13.505521 sudo[1838]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:34:13.505816 sudo[1838]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:34:13.517282 dbus-daemon[1413]: \xd0-} \x92U: received setenforce notice (enforcing=-73973936) Dec 13 14:34:13.519139 sudo[1838]: pam_unix(sudo:session): session closed for user root Dec 13 14:34:13.638382 sshd[1835]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:13.642006 systemd[1]: sshd@4-10.200.8.15:22-10.200.16.10:54296.service: Deactivated successfully. Dec 13 14:34:13.643041 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:34:13.643844 systemd-logind[1424]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:34:13.644704 systemd-logind[1424]: Removed session 7. Dec 13 14:34:13.757210 systemd[1]: Started sshd@5-10.200.8.15:22-10.200.16.10:54298.service. Dec 13 14:34:14.466440 sshd[1842]: Accepted publickey for core from 10.200.16.10 port 54298 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:34:14.468160 sshd[1842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:14.473324 systemd[1]: Started session-8.scope. Dec 13 14:34:14.473763 systemd-logind[1424]: New session 8 of user core. Dec 13 14:34:14.853207 sudo[1846]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:34:14.853506 sudo[1846]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:34:14.856292 sudo[1846]: pam_unix(sudo:session): session closed for user root Dec 13 14:34:14.860954 sudo[1845]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:34:14.861249 sudo[1845]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:34:14.870262 systemd[1]: Stopping audit-rules.service... Dec 13 14:34:14.870000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:34:14.875103 auditctl[1849]: No rules Dec 13 14:34:14.875445 kernel: kauditd_printk_skb: 134 callbacks suppressed Dec 13 14:34:14.875504 kernel: audit: type=1305 audit(1734100454.870:216): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:34:14.878308 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:34:14.878452 systemd[1]: Stopped audit-rules.service. Dec 13 14:34:14.880180 systemd[1]: Starting audit-rules.service... Dec 13 14:34:14.870000 audit[1849]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6c601450 a2=420 a3=0 items=0 ppid=1 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:14.901204 kernel: audit: type=1300 audit(1734100454.870:216): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6c601450 a2=420 a3=0 items=0 ppid=1 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:14.901286 kernel: audit: type=1327 audit(1734100454.870:216): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:34:14.870000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:34:14.902592 augenrules[1866]: No rules Dec 13 14:34:14.903346 systemd[1]: Finished audit-rules.service. Dec 13 14:34:14.906791 kernel: audit: type=1131 audit(1734100454.877:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:14.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:14.905593 sudo[1845]: pam_unix(sudo:session): session closed for user root Dec 13 14:34:14.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:14.928948 kernel: audit: type=1130 audit(1734100454.902:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:14.930102 kernel: audit: type=1106 audit(1734100454.904:219): pid=1845 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:14.904000 audit[1845]: USER_END pid=1845 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:14.942148 kernel: audit: type=1104 audit(1734100454.904:220): pid=1845 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:14.904000 audit[1845]: CRED_DISP pid=1845 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:15.020252 sshd[1842]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:15.021000 audit[1842]: USER_END pid=1842 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:15.021000 audit[1842]: CRED_DISP pid=1842 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:15.023908 systemd[1]: sshd@5-10.200.8.15:22-10.200.16.10:54298.service: Deactivated successfully. Dec 13 14:34:15.024888 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:34:15.025966 systemd-logind[1424]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:34:15.026753 systemd-logind[1424]: Removed session 8. Dec 13 14:34:15.055629 kernel: audit: type=1106 audit(1734100455.021:221): pid=1842 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:15.055757 kernel: audit: type=1104 audit(1734100455.021:222): pid=1842 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:15.055783 kernel: audit: type=1131 audit(1734100455.021:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.15:22-10.200.16.10:54298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:15.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.15:22-10.200.16.10:54298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:15.140657 systemd[1]: Started sshd@6-10.200.8.15:22-10.200.16.10:54308.service. Dec 13 14:34:15.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.16.10:54308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:15.845000 audit[1872]: USER_ACCT pid=1872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:15.846953 sshd[1872]: Accepted publickey for core from 10.200.16.10 port 54308 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:34:15.847000 audit[1872]: CRED_ACQ pid=1872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:15.847000 audit[1872]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc93719000 a2=3 a3=0 items=0 ppid=1 pid=1872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:15.847000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:15.848712 sshd[1872]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:15.853710 systemd[1]: Started session-9.scope. Dec 13 14:34:15.854198 systemd-logind[1424]: New session 9 of user core. Dec 13 14:34:15.857000 audit[1872]: USER_START pid=1872 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:15.859000 audit[1874]: CRED_ACQ pid=1874 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:16.231000 audit[1875]: USER_ACCT pid=1875 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:16.232000 audit[1875]: CRED_REFR pid=1875 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:16.233047 sudo[1875]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:34:16.234018 sudo[1875]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:34:16.234000 audit[1875]: USER_START pid=1875 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:16.247948 systemd[1]: Starting coreos-metadata.service... Dec 13 14:34:16.292382 coreos-metadata[1879]: Dec 13 14:34:16.292 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:34:16.295698 coreos-metadata[1879]: Dec 13 14:34:16.295 INFO Fetch successful Dec 13 14:34:16.295983 coreos-metadata[1879]: Dec 13 14:34:16.295 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Dec 13 14:34:16.297695 coreos-metadata[1879]: Dec 13 14:34:16.297 INFO Fetch successful Dec 13 14:34:16.297695 coreos-metadata[1879]: Dec 13 14:34:16.297 INFO Fetching http://168.63.129.16/machine/e0452d66-62a2-4ff9-aa66-4a2388f7c5b3/7a934be6%2D2238%2D4697%2Db985%2D2a2e20aca5ad.%5Fci%2D3510.3.6%2Da%2Dda29b84149?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Dec 13 14:34:16.299348 coreos-metadata[1879]: Dec 13 14:34:16.299 INFO Fetch successful Dec 13 14:34:16.332276 coreos-metadata[1879]: Dec 13 14:34:16.332 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:34:16.342896 coreos-metadata[1879]: Dec 13 14:34:16.342 INFO Fetch successful Dec 13 14:34:16.351691 systemd[1]: Finished coreos-metadata.service. Dec 13 14:34:16.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:17.097040 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Dec 13 14:34:17.097329 systemd[1]: Stopped kubelet.service. Dec 13 14:34:17.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:17.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:17.099058 systemd[1]: Starting kubelet.service... Dec 13 14:34:17.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:17.767615 systemd[1]: Started kubelet.service. Dec 13 14:34:17.810220 kubelet[1904]: E1213 14:34:17.810179 1904 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:34:17.811819 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:34:17.811975 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:34:17.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:34:18.083160 systemd[1]: Stopped kubelet.service. Dec 13 14:34:18.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:18.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:18.087037 systemd[1]: Starting kubelet.service... Dec 13 14:34:18.107412 systemd[1]: Reloading. Dec 13 14:34:18.241494 /usr/lib/systemd/system-generators/torcx-generator[1949]: time="2024-12-13T14:34:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:34:18.241528 /usr/lib/systemd/system-generators/torcx-generator[1949]: time="2024-12-13T14:34:18Z" level=info msg="torcx already run" Dec 13 14:34:18.316014 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:34:18.316034 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:34:18.332482 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.414000 audit: BPF prog-id=47 op=LOAD Dec 13 14:34:18.415000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.417000 audit: BPF prog-id=48 op=LOAD Dec 13 14:34:18.417000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:34:18.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.419000 audit: BPF prog-id=49 op=LOAD Dec 13 14:34:18.419000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:34:18.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit: BPF prog-id=50 op=LOAD Dec 13 14:34:18.421000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit: BPF prog-id=51 op=LOAD Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.421000 audit: BPF prog-id=52 op=LOAD Dec 13 14:34:18.421000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:34:18.421000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit: BPF prog-id=53 op=LOAD Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.422000 audit: BPF prog-id=54 op=LOAD Dec 13 14:34:18.422000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:34:18.422000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit: BPF prog-id=55 op=LOAD Dec 13 14:34:18.424000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit: BPF prog-id=56 op=LOAD Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.424000 audit: BPF prog-id=57 op=LOAD Dec 13 14:34:18.424000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:34:18.424000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.426000 audit: BPF prog-id=58 op=LOAD Dec 13 14:34:18.426000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:34:18.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit: BPF prog-id=59 op=LOAD Dec 13 14:34:18.428000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit: BPF prog-id=60 op=LOAD Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:18.428000 audit: BPF prog-id=61 op=LOAD Dec 13 14:34:18.428000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:34:18.428000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:34:18.449398 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:34:18.449492 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:34:18.449751 systemd[1]: Stopped kubelet.service. Dec 13 14:34:18.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:34:18.451551 systemd[1]: Starting kubelet.service... Dec 13 14:34:18.779003 systemd[1]: Started kubelet.service. Dec 13 14:34:18.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:18.816674 kubelet[2015]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:34:18.816674 kubelet[2015]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:34:18.816674 kubelet[2015]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:34:18.817180 kubelet[2015]: I1213 14:34:18.816739 2015 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:34:19.341802 kubelet[2015]: I1213 14:34:19.341759 2015 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:34:19.341802 kubelet[2015]: I1213 14:34:19.341787 2015 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:34:19.342100 kubelet[2015]: I1213 14:34:19.342067 2015 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:34:19.422537 kubelet[2015]: I1213 14:34:19.422495 2015 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:34:19.440308 kubelet[2015]: I1213 14:34:19.440277 2015 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:34:19.441275 kubelet[2015]: I1213 14:34:19.440679 2015 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:34:19.441490 kubelet[2015]: I1213 14:34:19.441259 2015 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.8.15","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:34:19.441652 kubelet[2015]: I1213 14:34:19.441506 2015 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:34:19.441652 kubelet[2015]: I1213 14:34:19.441521 2015 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:34:19.441744 kubelet[2015]: I1213 14:34:19.441666 2015 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:34:19.442586 kubelet[2015]: I1213 14:34:19.442567 2015 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:34:19.442686 kubelet[2015]: I1213 14:34:19.442590 2015 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:34:19.442686 kubelet[2015]: I1213 14:34:19.442617 2015 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:34:19.442686 kubelet[2015]: I1213 14:34:19.442637 2015 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:34:19.443182 kubelet[2015]: E1213 14:34:19.443138 2015 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:19.444149 kubelet[2015]: E1213 14:34:19.443407 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:19.446623 kubelet[2015]: I1213 14:34:19.446601 2015 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:34:19.448329 kubelet[2015]: I1213 14:34:19.448304 2015 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:34:19.448418 kubelet[2015]: W1213 14:34:19.448371 2015 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:34:19.449036 kubelet[2015]: W1213 14:34:19.449014 2015 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:34:19.449172 kubelet[2015]: I1213 14:34:19.449123 2015 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:34:19.449260 kubelet[2015]: E1213 14:34:19.449248 2015 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:34:19.449333 kubelet[2015]: I1213 14:34:19.449073 2015 server.go:1264] "Started kubelet" Dec 13 14:34:19.449574 kubelet[2015]: I1213 14:34:19.449552 2015 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:34:19.450031 kubelet[2015]: W1213 14:34:19.450012 2015 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.200.8.15" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:34:19.450137 kubelet[2015]: E1213 14:34:19.450121 2015 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.15" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:34:19.450189 kubelet[2015]: I1213 14:34:19.450160 2015 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:34:19.450000 audit[2015]: AVC avc: denied { mac_admin } for pid=2015 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:19.450000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:34:19.450000 audit[2015]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007b0de0 a1=c000a7ab58 a2=c0007b0db0 a3=25 items=0 ppid=1 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.450000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:34:19.450000 audit[2015]: AVC avc: denied { mac_admin } for pid=2015 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:19.450000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:34:19.450000 audit[2015]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00039be60 a1=c000a7ab70 a2=c0007b0e70 a3=25 items=0 ppid=1 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.450000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:34:19.452113 kubelet[2015]: I1213 14:34:19.451567 2015 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:34:19.452113 kubelet[2015]: I1213 14:34:19.451613 2015 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:34:19.452113 kubelet[2015]: I1213 14:34:19.451680 2015 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:34:19.454000 audit[2025]: NETFILTER_CFG table=mangle:6 family=2 entries=2 op=nft_register_chain pid=2025 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:19.454000 audit[2025]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec82cb6c0 a2=0 a3=7ffec82cb6ac items=0 ppid=2015 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:34:19.456000 audit[2026]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=2026 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:19.456000 audit[2026]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd17fd3e30 a2=0 a3=7ffd17fd3e1c items=0 ppid=2015 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:34:19.459921 kubelet[2015]: I1213 14:34:19.459891 2015 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:34:19.462910 kubelet[2015]: I1213 14:34:19.462634 2015 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:34:19.463562 kubelet[2015]: I1213 14:34:19.463543 2015 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:34:19.463748 kubelet[2015]: I1213 14:34:19.463728 2015 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:34:19.463000 audit[2028]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=2028 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:19.463000 audit[2028]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe6155d390 a2=0 a3=7ffe6155d37c items=0 ppid=2015 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:19.465575 kubelet[2015]: I1213 14:34:19.465546 2015 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:34:19.465671 kubelet[2015]: I1213 14:34:19.465627 2015 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:34:19.465000 audit[2030]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=2030 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:19.465000 audit[2030]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc20577990 a2=0 a3=7ffc2057797c items=0 ppid=2015 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:19.467259 kubelet[2015]: E1213 14:34:19.467239 2015 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:34:19.467621 kubelet[2015]: I1213 14:34:19.467604 2015 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:34:19.479000 audit[2033]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=2033 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:19.479000 audit[2033]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc3e5eaa20 a2=0 a3=7ffc3e5eaa0c items=0 ppid=2015 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:34:19.481351 kubelet[2015]: I1213 14:34:19.481159 2015 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:34:19.481000 audit[2034]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=2034 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:19.481000 audit[2034]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd998ff900 a2=0 a3=7ffd998ff8ec items=0 ppid=2015 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:34:19.482445 kubelet[2015]: I1213 14:34:19.482389 2015 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:34:19.482445 kubelet[2015]: I1213 14:34:19.482414 2015 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:34:19.482445 kubelet[2015]: I1213 14:34:19.482437 2015 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:34:19.482571 kubelet[2015]: E1213 14:34:19.482480 2015 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:34:19.482000 audit[2035]: NETFILTER_CFG table=mangle:12 family=2 entries=1 op=nft_register_chain pid=2035 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:19.482000 audit[2035]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea59940c0 a2=0 a3=7ffea59940ac items=0 ppid=2015 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:34:19.484000 audit[2038]: NETFILTER_CFG table=mangle:13 family=10 entries=1 op=nft_register_chain pid=2038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:19.484000 audit[2038]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe58e2b3c0 a2=0 a3=7ffe58e2b3ac items=0 ppid=2015 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:34:19.486000 audit[2039]: NETFILTER_CFG table=nat:14 family=10 entries=2 op=nft_register_chain pid=2039 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:19.486000 audit[2039]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd9c2099c0 a2=0 a3=7ffd9c2099ac items=0 ppid=2015 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:34:19.489682 kubelet[2015]: E1213 14:34:19.489655 2015 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:34:19.490000 audit[2041]: NETFILTER_CFG table=nat:15 family=2 entries=2 op=nft_register_chain pid=2041 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:19.490000 audit[2041]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff43e82360 a2=0 a3=7fff43e8234c items=0 ppid=2015 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:34:19.491000 audit[2042]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=2042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:19.491000 audit[2042]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9b22a4d0 a2=0 a3=7fff9b22a4bc items=0 ppid=2015 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:34:19.494061 kubelet[2015]: W1213 14:34:19.494042 2015 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:34:19.494220 kubelet[2015]: E1213 14:34:19.494206 2015 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:34:19.494340 kubelet[2015]: W1213 14:34:19.494320 2015 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Dec 13 14:34:19.494406 kubelet[2015]: E1213 14:34:19.494345 2015 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Dec 13 14:34:19.494677 kubelet[2015]: E1213 14:34:19.494318 2015 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.8.15.1810c32e224d62c5 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.8.15,UID:10.200.8.15,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.8.15,},FirstTimestamp:2024-12-13 14:34:19.449049797 +0000 UTC m=+0.664535436,LastTimestamp:2024-12-13 14:34:19.449049797 +0000 UTC m=+0.664535436,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.8.15,}" Dec 13 14:34:19.495165 kubelet[2015]: I1213 14:34:19.495147 2015 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:34:19.495165 kubelet[2015]: I1213 14:34:19.495163 2015 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:34:19.495280 kubelet[2015]: I1213 14:34:19.495181 2015 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:34:19.495000 audit[2044]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=2044 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:19.495000 audit[2044]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0f2a0a50 a2=0 a3=7ffd0f2a0a3c items=0 ppid=2015 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.495000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:34:19.503731 kubelet[2015]: I1213 14:34:19.503716 2015 policy_none.go:49] "None policy: Start" Dec 13 14:34:19.504540 kubelet[2015]: I1213 14:34:19.504521 2015 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:34:19.504621 kubelet[2015]: I1213 14:34:19.504546 2015 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:34:19.516878 systemd[1]: Created slice kubepods.slice. Dec 13 14:34:19.524695 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:34:19.527602 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:34:19.534707 kubelet[2015]: I1213 14:34:19.534674 2015 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:34:19.533000 audit[2015]: AVC avc: denied { mac_admin } for pid=2015 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:19.533000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:34:19.533000 audit[2015]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e7b7d0 a1=c00014ba58 a2=c000e7b7a0 a3=25 items=0 ppid=1 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:19.533000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:34:19.535045 kubelet[2015]: I1213 14:34:19.534761 2015 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:34:19.535045 kubelet[2015]: I1213 14:34:19.534877 2015 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:34:19.535045 kubelet[2015]: I1213 14:34:19.535002 2015 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:34:19.537964 kubelet[2015]: E1213 14:34:19.537939 2015 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.15\" not found" Dec 13 14:34:19.564461 kubelet[2015]: I1213 14:34:19.564407 2015 kubelet_node_status.go:73] "Attempting to register node" node="10.200.8.15" Dec 13 14:34:19.568524 kubelet[2015]: I1213 14:34:19.568499 2015 kubelet_node_status.go:76] "Successfully registered node" node="10.200.8.15" Dec 13 14:34:19.574444 kubelet[2015]: E1213 14:34:19.574419 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:19.675584 kubelet[2015]: E1213 14:34:19.675529 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:19.775683 kubelet[2015]: E1213 14:34:19.775625 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:19.802934 sudo[1875]: pam_unix(sudo:session): session closed for user root Dec 13 14:34:19.801000 audit[1875]: USER_END pid=1875 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:19.802000 audit[1875]: CRED_DISP pid=1875 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:19.876815 kubelet[2015]: E1213 14:34:19.876758 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:19.917968 sshd[1872]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:19.918000 audit[1872]: USER_END pid=1872 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:19.926786 kernel: kauditd_printk_skb: 242 callbacks suppressed Dec 13 14:34:19.926871 kernel: audit: type=1106 audit(1734100459.918:431): pid=1872 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:19.924853 systemd[1]: sshd@6-10.200.8.15:22-10.200.16.10:54308.service: Deactivated successfully. Dec 13 14:34:19.925821 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:34:19.927444 systemd-logind[1424]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:34:19.928670 systemd-logind[1424]: Removed session 9. Dec 13 14:34:19.918000 audit[1872]: CRED_DISP pid=1872 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:19.959469 kernel: audit: type=1104 audit(1734100459.918:432): pid=1872 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:34:19.959536 kernel: audit: type=1131 audit(1734100459.924:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.16.10:54308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:19.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.16.10:54308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:19.978382 kubelet[2015]: E1213 14:34:19.978338 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:20.079264 kubelet[2015]: E1213 14:34:20.079201 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:20.180105 kubelet[2015]: E1213 14:34:20.179970 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:20.280620 kubelet[2015]: E1213 14:34:20.280570 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:20.343856 kubelet[2015]: I1213 14:34:20.343799 2015 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:34:20.381520 kubelet[2015]: E1213 14:34:20.381470 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:20.444038 kubelet[2015]: E1213 14:34:20.443901 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:20.481649 kubelet[2015]: E1213 14:34:20.481594 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:20.582654 kubelet[2015]: E1213 14:34:20.582606 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:20.683594 kubelet[2015]: E1213 14:34:20.683552 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:20.784326 kubelet[2015]: E1213 14:34:20.784189 2015 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Dec 13 14:34:20.885719 kubelet[2015]: I1213 14:34:20.885688 2015 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:34:20.886296 env[1430]: time="2024-12-13T14:34:20.886092472Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:34:20.886703 kubelet[2015]: I1213 14:34:20.886456 2015 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:34:21.444907 kubelet[2015]: I1213 14:34:21.444862 2015 apiserver.go:52] "Watching apiserver" Dec 13 14:34:21.445224 kubelet[2015]: E1213 14:34:21.444904 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:21.449397 kubelet[2015]: I1213 14:34:21.449362 2015 topology_manager.go:215] "Topology Admit Handler" podUID="a9e299e7-8a45-4460-8269-74f513cbcdb7" podNamespace="kube-system" podName="kube-proxy-4sztl" Dec 13 14:34:21.449534 kubelet[2015]: I1213 14:34:21.449485 2015 topology_manager.go:215] "Topology Admit Handler" podUID="8b0aa91d-d07b-4551-8ab2-58b08d60a804" podNamespace="calico-system" podName="calico-node-gxmjb" Dec 13 14:34:21.449640 kubelet[2015]: I1213 14:34:21.449618 2015 topology_manager.go:215] "Topology Admit Handler" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" podNamespace="calico-system" podName="csi-node-driver-2tkgs" Dec 13 14:34:21.449835 kubelet[2015]: E1213 14:34:21.449808 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:21.455232 systemd[1]: Created slice kubepods-besteffort-pod8b0aa91d_d07b_4551_8ab2_58b08d60a804.slice. Dec 13 14:34:21.465916 systemd[1]: Created slice kubepods-besteffort-poda9e299e7_8a45_4460_8269_74f513cbcdb7.slice. Dec 13 14:34:21.467649 kubelet[2015]: I1213 14:34:21.467624 2015 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:34:21.477280 kubelet[2015]: I1213 14:34:21.477254 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8b0aa91d-d07b-4551-8ab2-58b08d60a804-flexvol-driver-host\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.477389 kubelet[2015]: I1213 14:34:21.477289 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p64gh\" (UniqueName: \"kubernetes.io/projected/a9e299e7-8a45-4460-8269-74f513cbcdb7-kube-api-access-p64gh\") pod \"kube-proxy-4sztl\" (UID: \"a9e299e7-8a45-4460-8269-74f513cbcdb7\") " pod="kube-system/kube-proxy-4sztl" Dec 13 14:34:21.477389 kubelet[2015]: I1213 14:34:21.477314 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8b0aa91d-d07b-4551-8ab2-58b08d60a804-policysync\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.477389 kubelet[2015]: I1213 14:34:21.477334 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8b0aa91d-d07b-4551-8ab2-58b08d60a804-tigera-ca-bundle\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.477389 kubelet[2015]: I1213 14:34:21.477356 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8b0aa91d-d07b-4551-8ab2-58b08d60a804-node-certs\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.477389 kubelet[2015]: I1213 14:34:21.477379 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8b0aa91d-d07b-4551-8ab2-58b08d60a804-var-run-calico\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.477671 kubelet[2015]: I1213 14:34:21.477398 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8b0aa91d-d07b-4551-8ab2-58b08d60a804-cni-bin-dir\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.477671 kubelet[2015]: I1213 14:34:21.477418 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a9e299e7-8a45-4460-8269-74f513cbcdb7-lib-modules\") pod \"kube-proxy-4sztl\" (UID: \"a9e299e7-8a45-4460-8269-74f513cbcdb7\") " pod="kube-system/kube-proxy-4sztl" Dec 13 14:34:21.477671 kubelet[2015]: I1213 14:34:21.477440 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8b0aa91d-d07b-4551-8ab2-58b08d60a804-var-lib-calico\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.477671 kubelet[2015]: I1213 14:34:21.477469 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-25xhm\" (UniqueName: \"kubernetes.io/projected/8b0aa91d-d07b-4551-8ab2-58b08d60a804-kube-api-access-25xhm\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.477671 kubelet[2015]: I1213 14:34:21.477491 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cb477b23-5d83-4ff1-b5ba-e29abf5e379d-varrun\") pod \"csi-node-driver-2tkgs\" (UID: \"cb477b23-5d83-4ff1-b5ba-e29abf5e379d\") " pod="calico-system/csi-node-driver-2tkgs" Dec 13 14:34:21.477894 kubelet[2015]: I1213 14:34:21.477514 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cb477b23-5d83-4ff1-b5ba-e29abf5e379d-socket-dir\") pod \"csi-node-driver-2tkgs\" (UID: \"cb477b23-5d83-4ff1-b5ba-e29abf5e379d\") " pod="calico-system/csi-node-driver-2tkgs" Dec 13 14:34:21.477894 kubelet[2015]: I1213 14:34:21.477559 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a9e299e7-8a45-4460-8269-74f513cbcdb7-xtables-lock\") pod \"kube-proxy-4sztl\" (UID: \"a9e299e7-8a45-4460-8269-74f513cbcdb7\") " pod="kube-system/kube-proxy-4sztl" Dec 13 14:34:21.477894 kubelet[2015]: I1213 14:34:21.477636 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8b0aa91d-d07b-4551-8ab2-58b08d60a804-cni-log-dir\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.477894 kubelet[2015]: I1213 14:34:21.477664 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cb477b23-5d83-4ff1-b5ba-e29abf5e379d-kubelet-dir\") pod \"csi-node-driver-2tkgs\" (UID: \"cb477b23-5d83-4ff1-b5ba-e29abf5e379d\") " pod="calico-system/csi-node-driver-2tkgs" Dec 13 14:34:21.477894 kubelet[2015]: I1213 14:34:21.477686 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a9e299e7-8a45-4460-8269-74f513cbcdb7-kube-proxy\") pod \"kube-proxy-4sztl\" (UID: \"a9e299e7-8a45-4460-8269-74f513cbcdb7\") " pod="kube-system/kube-proxy-4sztl" Dec 13 14:34:21.478059 kubelet[2015]: I1213 14:34:21.477708 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8b0aa91d-d07b-4551-8ab2-58b08d60a804-lib-modules\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.478059 kubelet[2015]: I1213 14:34:21.477734 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8b0aa91d-d07b-4551-8ab2-58b08d60a804-xtables-lock\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.478059 kubelet[2015]: I1213 14:34:21.477756 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8b0aa91d-d07b-4551-8ab2-58b08d60a804-cni-net-dir\") pod \"calico-node-gxmjb\" (UID: \"8b0aa91d-d07b-4551-8ab2-58b08d60a804\") " pod="calico-system/calico-node-gxmjb" Dec 13 14:34:21.478059 kubelet[2015]: I1213 14:34:21.477777 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cb477b23-5d83-4ff1-b5ba-e29abf5e379d-registration-dir\") pod \"csi-node-driver-2tkgs\" (UID: \"cb477b23-5d83-4ff1-b5ba-e29abf5e379d\") " pod="calico-system/csi-node-driver-2tkgs" Dec 13 14:34:21.478059 kubelet[2015]: I1213 14:34:21.477825 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l7qhc\" (UniqueName: \"kubernetes.io/projected/cb477b23-5d83-4ff1-b5ba-e29abf5e379d-kube-api-access-l7qhc\") pod \"csi-node-driver-2tkgs\" (UID: \"cb477b23-5d83-4ff1-b5ba-e29abf5e379d\") " pod="calico-system/csi-node-driver-2tkgs" Dec 13 14:34:21.583754 kubelet[2015]: E1213 14:34:21.583718 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:21.583754 kubelet[2015]: W1213 14:34:21.583748 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:21.583932 kubelet[2015]: E1213 14:34:21.583772 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:21.590914 kubelet[2015]: E1213 14:34:21.590877 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:21.590914 kubelet[2015]: W1213 14:34:21.590911 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:21.591128 kubelet[2015]: E1213 14:34:21.590932 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:21.604294 kubelet[2015]: E1213 14:34:21.598235 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:21.604294 kubelet[2015]: W1213 14:34:21.598262 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:21.604294 kubelet[2015]: E1213 14:34:21.598280 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:21.604294 kubelet[2015]: E1213 14:34:21.600613 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:21.604294 kubelet[2015]: W1213 14:34:21.600633 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:21.604294 kubelet[2015]: E1213 14:34:21.600648 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:21.607560 kubelet[2015]: E1213 14:34:21.607539 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:21.607560 kubelet[2015]: W1213 14:34:21.607553 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:21.607687 kubelet[2015]: E1213 14:34:21.607571 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:21.767057 env[1430]: time="2024-12-13T14:34:21.765443545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gxmjb,Uid:8b0aa91d-d07b-4551-8ab2-58b08d60a804,Namespace:calico-system,Attempt:0,}" Dec 13 14:34:21.770864 env[1430]: time="2024-12-13T14:34:21.770809757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4sztl,Uid:a9e299e7-8a45-4460-8269-74f513cbcdb7,Namespace:kube-system,Attempt:0,}" Dec 13 14:34:22.446391 kubelet[2015]: E1213 14:34:22.446328 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:22.829348 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount663558573.mount: Deactivated successfully. Dec 13 14:34:22.903581 env[1430]: time="2024-12-13T14:34:22.903506852Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:22.907315 env[1430]: time="2024-12-13T14:34:22.907271828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:23.015055 env[1430]: time="2024-12-13T14:34:23.014999819Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:23.063291 env[1430]: time="2024-12-13T14:34:23.063213374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:23.108645 env[1430]: time="2024-12-13T14:34:23.108596673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:23.155798 env[1430]: time="2024-12-13T14:34:23.155729607Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:23.162254 env[1430]: time="2024-12-13T14:34:23.162208435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:23.207483 env[1430]: time="2024-12-13T14:34:23.207428731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:23.447417 kubelet[2015]: E1213 14:34:23.447277 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:23.483090 kubelet[2015]: E1213 14:34:23.483019 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:23.639301 env[1430]: time="2024-12-13T14:34:23.639233185Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:23.639488 env[1430]: time="2024-12-13T14:34:23.639274886Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:23.639488 env[1430]: time="2024-12-13T14:34:23.639288886Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:23.640237 env[1430]: time="2024-12-13T14:34:23.639535591Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba5faf21a9caa73fef47df515d3454a9b06152e30b0ba6fa6ef189c3418d7278 pid=2064 runtime=io.containerd.runc.v2 Dec 13 14:34:23.657981 systemd[1]: Started cri-containerd-ba5faf21a9caa73fef47df515d3454a9b06152e30b0ba6fa6ef189c3418d7278.scope. Dec 13 14:34:23.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.706298 kernel: audit: type=1400 audit(1734100463.677:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.706449 kernel: audit: type=1400 audit(1734100463.678:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.721263 kernel: audit: type=1400 audit(1734100463.678:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.730323 env[1430]: time="2024-12-13T14:34:23.730234488Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:23.732557 env[1430]: time="2024-12-13T14:34:23.730275488Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:23.732672 env[1430]: time="2024-12-13T14:34:23.732574934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:23.732799 env[1430]: time="2024-12-13T14:34:23.732724437Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/992d6ebeffc0fc0cfa877e49cacfff3c47876c67f4b051268085bbf546b4c203 pid=2098 runtime=io.containerd.runc.v2 Dec 13 14:34:23.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.748693 kernel: audit: type=1400 audit(1734100463.678:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.761685 env[1430]: time="2024-12-13T14:34:23.761639410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4sztl,Uid:a9e299e7-8a45-4460-8269-74f513cbcdb7,Namespace:kube-system,Attempt:0,} returns sandbox id \"ba5faf21a9caa73fef47df515d3454a9b06152e30b0ba6fa6ef189c3418d7278\"" Dec 13 14:34:23.763931 env[1430]: time="2024-12-13T14:34:23.763904055Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:34:23.768264 kernel: audit: type=1400 audit(1734100463.678:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.770068 systemd[1]: Started cri-containerd-992d6ebeffc0fc0cfa877e49cacfff3c47876c67f4b051268085bbf546b4c203.scope. Dec 13 14:34:23.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.795602 kernel: audit: type=1400 audit(1734100463.678:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.795710 kernel: audit: type=1400 audit(1734100463.678:440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.723000 audit: BPF prog-id=62 op=LOAD Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2064 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261356661663231613963616137336665663437646635313564333435 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2064 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261356661663231613963616137336665663437646635313564333435 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit: BPF prog-id=63 op=LOAD Dec 13 14:34:23.724000 audit[2074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000345b70 items=0 ppid=2064 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261356661663231613963616137336665663437646635313564333435 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit: BPF prog-id=64 op=LOAD Dec 13 14:34:23.724000 audit[2074]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000345bb8 items=0 ppid=2064 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261356661663231613963616137336665663437646635313564333435 Dec 13 14:34:23.724000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:34:23.724000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.724000 audit: BPF prog-id=65 op=LOAD Dec 13 14:34:23.724000 audit[2074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000345fc8 items=0 ppid=2064 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261356661663231613963616137336665663437646635313564333435 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.802000 audit: BPF prog-id=66 op=LOAD Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2098 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939326436656265666663306663306366613837376534396361636666 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2098 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939326436656265666663306663306366613837376534396361636666 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.803000 audit: BPF prog-id=67 op=LOAD Dec 13 14:34:23.803000 audit[2111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003bc9c0 items=0 ppid=2098 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939326436656265666663306663306366613837376534396361636666 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit: BPF prog-id=68 op=LOAD Dec 13 14:34:23.804000 audit[2111]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003bca08 items=0 ppid=2098 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939326436656265666663306663306366613837376534396361636666 Dec 13 14:34:23.804000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:34:23.804000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { perfmon } for pid=2111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit[2111]: AVC avc: denied { bpf } for pid=2111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.804000 audit: BPF prog-id=69 op=LOAD Dec 13 14:34:23.804000 audit[2111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bce18 items=0 ppid=2098 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939326436656265666663306663306366613837376534396361636666 Dec 13 14:34:23.822015 systemd[1]: run-containerd-runc-k8s.io-ba5faf21a9caa73fef47df515d3454a9b06152e30b0ba6fa6ef189c3418d7278-runc.yn79ri.mount: Deactivated successfully. Dec 13 14:34:23.827834 env[1430]: time="2024-12-13T14:34:23.827782620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gxmjb,Uid:8b0aa91d-d07b-4551-8ab2-58b08d60a804,Namespace:calico-system,Attempt:0,} returns sandbox id \"992d6ebeffc0fc0cfa877e49cacfff3c47876c67f4b051268085bbf546b4c203\"" Dec 13 14:34:24.448299 kubelet[2015]: E1213 14:34:24.448250 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:25.449095 kubelet[2015]: E1213 14:34:25.449021 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:25.482867 kubelet[2015]: E1213 14:34:25.482795 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:26.449805 kubelet[2015]: E1213 14:34:26.449759 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:26.811009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1876902641.mount: Deactivated successfully. Dec 13 14:34:27.450526 kubelet[2015]: E1213 14:34:27.450462 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:27.485116 kubelet[2015]: E1213 14:34:27.484808 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:27.808261 env[1430]: time="2024-12-13T14:34:27.808108395Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:27.854658 env[1430]: time="2024-12-13T14:34:27.854590621Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:27.901095 env[1430]: time="2024-12-13T14:34:27.901017246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:27.905546 env[1430]: time="2024-12-13T14:34:27.905483125Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:27.906103 env[1430]: time="2024-12-13T14:34:27.906053436Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:34:27.907929 env[1430]: time="2024-12-13T14:34:27.907899168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:34:27.908882 env[1430]: time="2024-12-13T14:34:27.908848185Z" level=info msg="CreateContainer within sandbox \"ba5faf21a9caa73fef47df515d3454a9b06152e30b0ba6fa6ef189c3418d7278\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:34:28.076353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2640225706.mount: Deactivated successfully. Dec 13 14:34:28.084417 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3014798232.mount: Deactivated successfully. Dec 13 14:34:28.206184 env[1430]: time="2024-12-13T14:34:28.206102476Z" level=info msg="CreateContainer within sandbox \"ba5faf21a9caa73fef47df515d3454a9b06152e30b0ba6fa6ef189c3418d7278\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d8e68c6ea9231c32f3f5b10ed7fe6957d9667fedca4c3a04418f2a01de3207a0\"" Dec 13 14:34:28.207261 env[1430]: time="2024-12-13T14:34:28.206929491Z" level=info msg="StartContainer for \"d8e68c6ea9231c32f3f5b10ed7fe6957d9667fedca4c3a04418f2a01de3207a0\"" Dec 13 14:34:28.230887 systemd[1]: Started cri-containerd-d8e68c6ea9231c32f3f5b10ed7fe6957d9667fedca4c3a04418f2a01de3207a0.scope. Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.257774 kernel: kauditd_printk_skb: 107 callbacks suppressed Dec 13 14:34:28.257870 kernel: audit: type=1400 audit(1734100468.251:470): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f949c15ea88 items=0 ppid=2064 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.293212 kernel: audit: type=1300 audit(1734100468.251:470): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f949c15ea88 items=0 ppid=2064 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653638633665613932333163333266336635623130656437666536 Dec 13 14:34:28.315166 kernel: audit: type=1327 audit(1734100468.251:470): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653638633665613932333163333266336635623130656437666536 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.707191 kernel: audit: type=1400 audit(1734100468.251:471): avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.707363 kernel: audit: type=1400 audit(1734100468.251:471): avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.707447 kernel: audit: type=1400 audit(1734100468.251:471): avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.707488 kernel: audit: type=1400 audit(1734100468.251:471): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.707524 kernel: audit: type=1400 audit(1734100468.251:471): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.707556 kernel: audit: type=1400 audit(1734100468.251:471): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.707592 kernel: audit: type=1400 audit(1734100468.251:471): avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.251000 audit: BPF prog-id=70 op=LOAD Dec 13 14:34:28.251000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d22c8 items=0 ppid=2064 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653638633665613932333163333266336635623130656437666536 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit: BPF prog-id=71 op=LOAD Dec 13 14:34:28.270000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d2318 items=0 ppid=2064 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653638633665613932333163333266336635623130656437666536 Dec 13 14:34:28.270000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:34:28.270000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:28.270000 audit: BPF prog-id=72 op=LOAD Dec 13 14:34:28.270000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d23a8 items=0 ppid=2064 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653638633665613932333163333266336635623130656437666536 Dec 13 14:34:28.709919 kubelet[2015]: E1213 14:34:28.450782 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:28.724000 audit[2202]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.724000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1d07ab60 a2=0 a3=7ffc1d07ab4c items=0 ppid=2161 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:34:28.726000 audit[2203]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.726000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3deb0130 a2=0 a3=7ffe3deb011c items=0 ppid=2161 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:34:28.728000 audit[2204]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.728000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe538b0400 a2=0 a3=7ffe538b03ec items=0 ppid=2161 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:34:28.728000 audit[2205]: NETFILTER_CFG table=mangle:21 family=10 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.728000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc831d0f70 a2=0 a3=7ffc831d0f5c items=0 ppid=2161 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:34:28.730000 audit[2206]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.730000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9d341bd0 a2=0 a3=7ffd9d341bbc items=0 ppid=2161 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:34:28.732000 audit[2207]: NETFILTER_CFG table=filter:23 family=10 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.732000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffceae7ad70 a2=0 a3=7ffceae7ad5c items=0 ppid=2161 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:34:28.757481 env[1430]: time="2024-12-13T14:34:28.757414817Z" level=info msg="StartContainer for \"d8e68c6ea9231c32f3f5b10ed7fe6957d9667fedca4c3a04418f2a01de3207a0\" returns successfully" Dec 13 14:34:28.827000 audit[2208]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.827000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc13884b90 a2=0 a3=7ffc13884b7c items=0 ppid=2161 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:34:28.832000 audit[2210]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.832000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd5b6ddb00 a2=0 a3=7ffd5b6ddaec items=0 ppid=2161 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:34:28.835000 audit[2213]: NETFILTER_CFG table=filter:26 family=2 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.835000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdc76e1a00 a2=0 a3=7ffdc76e19ec items=0 ppid=2161 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:34:28.837000 audit[2214]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.837000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdc3b8300 a2=0 a3=7fffdc3b82ec items=0 ppid=2161 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:34:28.839000 audit[2216]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.839000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd48267790 a2=0 a3=7ffd4826777c items=0 ppid=2161 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:34:28.841000 audit[2217]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.841000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb8f74b30 a2=0 a3=7ffdb8f74b1c items=0 ppid=2161 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:34:28.843000 audit[2219]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.843000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd03b0130 a2=0 a3=7ffdd03b011c items=0 ppid=2161 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:34:28.847000 audit[2222]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.847000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd2c5c0c80 a2=0 a3=7ffd2c5c0c6c items=0 ppid=2161 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:34:28.849000 audit[2223]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.849000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceed849b0 a2=0 a3=7ffceed8499c items=0 ppid=2161 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:34:28.852000 audit[2225]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.852000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd57d838e0 a2=0 a3=7ffd57d838cc items=0 ppid=2161 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:34:28.853000 audit[2226]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.853000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb1e074a0 a2=0 a3=7ffdb1e0748c items=0 ppid=2161 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:34:28.855000 audit[2228]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.855000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2d58ada0 a2=0 a3=7ffd2d58ad8c items=0 ppid=2161 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:34:28.859000 audit[2231]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.859000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc708a1f0 a2=0 a3=7fffc708a1dc items=0 ppid=2161 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:34:28.863000 audit[2234]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.863000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd99bea8a0 a2=0 a3=7ffd99bea88c items=0 ppid=2161 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:34:28.864000 audit[2235]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.864000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff07f1e330 a2=0 a3=7fff07f1e31c items=0 ppid=2161 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:34:28.867000 audit[2237]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.867000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc095584c0 a2=0 a3=7ffc095584ac items=0 ppid=2161 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:28.899000 audit[2242]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.899000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdde954a60 a2=0 a3=7ffdde954a4c items=0 ppid=2161 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:28.900000 audit[2243]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.900000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3621f1c0 a2=0 a3=7ffd3621f1ac items=0 ppid=2161 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:34:28.902000 audit[2245]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:28.902000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffec70457c0 a2=0 a3=7ffec70457ac items=0 ppid=2161 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:34:28.919000 audit[2251]: NETFILTER_CFG table=filter:43 family=2 entries=5 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:28.919000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe7370adf0 a2=0 a3=7ffe7370addc items=0 ppid=2161 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:28.961000 audit[2251]: NETFILTER_CFG table=nat:44 family=2 entries=65 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:28.961000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffe7370adf0 a2=0 a3=7ffe7370addc items=0 ppid=2161 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.961000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:28.981000 audit[2259]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.981000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffe5b638c0 a2=0 a3=7fffe5b638ac items=0 ppid=2161 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:34:28.984000 audit[2261]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.984000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdd1610320 a2=0 a3=7ffdd161030c items=0 ppid=2161 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:34:28.988000 audit[2264]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.988000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe37b67710 a2=0 a3=7ffe37b676fc items=0 ppid=2161 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:34:28.990000 audit[2265]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.990000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd04594f00 a2=0 a3=7ffd04594eec items=0 ppid=2161 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:34:28.992000 audit[2267]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.992000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc97eff9d0 a2=0 a3=7ffc97eff9bc items=0 ppid=2161 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:34:28.993000 audit[2268]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.993000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebef2bbe0 a2=0 a3=7ffebef2bbcc items=0 ppid=2161 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:34:28.996000 audit[2270]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:28.996000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc3f9ba890 a2=0 a3=7ffc3f9ba87c items=0 ppid=2161 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:34:29.000000 audit[2273]: NETFILTER_CFG table=filter:52 family=10 entries=2 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.000000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd76ddfcd0 a2=0 a3=7ffd76ddfcbc items=0 ppid=2161 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:34:29.001000 audit[2274]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.001000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf2124240 a2=0 a3=7ffdf212422c items=0 ppid=2161 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:34:29.003000 audit[2276]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.003000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9cf73d10 a2=0 a3=7ffc9cf73cfc items=0 ppid=2161 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:34:29.005000 audit[2277]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.005000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7baca7b0 a2=0 a3=7ffd7baca79c items=0 ppid=2161 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.005000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:34:29.007000 audit[2279]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.007000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffab2f12d0 a2=0 a3=7fffab2f12bc items=0 ppid=2161 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:34:29.011000 audit[2282]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.011000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfe6279b0 a2=0 a3=7ffdfe62799c items=0 ppid=2161 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:34:29.015000 audit[2285]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.015000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd197c0bc0 a2=0 a3=7ffd197c0bac items=0 ppid=2161 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:34:29.016000 audit[2286]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.016000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec0b05050 a2=0 a3=7ffec0b0503c items=0 ppid=2161 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:34:29.018000 audit[2288]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.018000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc20ec1c90 a2=0 a3=7ffc20ec1c7c items=0 ppid=2161 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:29.022000 audit[2291]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.022000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffe5388720 a2=0 a3=7fffe538870c items=0 ppid=2161 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:29.023000 audit[2292]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.023000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe3f04ec0 a2=0 a3=7fffe3f04eac items=0 ppid=2161 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:34:29.026000 audit[2294]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.026000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd91db0580 a2=0 a3=7ffd91db056c items=0 ppid=2161 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:34:29.027000 audit[2295]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.027000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe62147dd0 a2=0 a3=7ffe62147dbc items=0 ppid=2161 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:34:29.029000 audit[2297]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.029000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe07315c90 a2=0 a3=7ffe07315c7c items=0 ppid=2161 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:29.033000 audit[2300]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:29.033000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc27f0b570 a2=0 a3=7ffc27f0b55c items=0 ppid=2161 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:29.036000 audit[2302]: NETFILTER_CFG table=filter:67 family=10 entries=3 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:34:29.036000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc16377e80 a2=0 a3=7ffc16377e6c items=0 ppid=2161 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.036000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:29.037000 audit[2302]: NETFILTER_CFG table=nat:68 family=10 entries=7 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:34:29.037000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc16377e80 a2=0 a3=7ffc16377e6c items=0 ppid=2161 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:29.037000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:29.451113 kubelet[2015]: E1213 14:34:29.451036 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:29.483174 kubelet[2015]: E1213 14:34:29.483125 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:29.773413 kubelet[2015]: I1213 14:34:29.773275 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-4sztl" podStartSLOduration=6.629422134 podStartE2EDuration="10.773261246s" podCreationTimestamp="2024-12-13 14:34:19 +0000 UTC" firstStartedPulling="2024-12-13 14:34:23.763346744 +0000 UTC m=+4.978832283" lastFinishedPulling="2024-12-13 14:34:27.907185856 +0000 UTC m=+9.122671395" observedRunningTime="2024-12-13 14:34:29.773100243 +0000 UTC m=+10.988585982" watchObservedRunningTime="2024-12-13 14:34:29.773261246 +0000 UTC m=+10.988746885" Dec 13 14:34:29.843394 kubelet[2015]: E1213 14:34:29.843355 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.843394 kubelet[2015]: W1213 14:34:29.843383 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.843707 kubelet[2015]: E1213 14:34:29.843410 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.843707 kubelet[2015]: E1213 14:34:29.843665 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.843707 kubelet[2015]: W1213 14:34:29.843678 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.843707 kubelet[2015]: E1213 14:34:29.843695 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.843940 kubelet[2015]: E1213 14:34:29.843903 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.843940 kubelet[2015]: W1213 14:34:29.843915 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.843940 kubelet[2015]: E1213 14:34:29.843929 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.844198 kubelet[2015]: E1213 14:34:29.844180 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.844280 kubelet[2015]: W1213 14:34:29.844199 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.844280 kubelet[2015]: E1213 14:34:29.844219 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.844474 kubelet[2015]: E1213 14:34:29.844455 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.844474 kubelet[2015]: W1213 14:34:29.844470 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.844645 kubelet[2015]: E1213 14:34:29.844486 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.844708 kubelet[2015]: E1213 14:34:29.844689 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.844708 kubelet[2015]: W1213 14:34:29.844700 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.844826 kubelet[2015]: E1213 14:34:29.844715 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.844928 kubelet[2015]: E1213 14:34:29.844906 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.844928 kubelet[2015]: W1213 14:34:29.844923 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.845107 kubelet[2015]: E1213 14:34:29.844938 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.845177 kubelet[2015]: E1213 14:34:29.845161 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.845177 kubelet[2015]: W1213 14:34:29.845173 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.845284 kubelet[2015]: E1213 14:34:29.845188 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.845415 kubelet[2015]: E1213 14:34:29.845398 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.845415 kubelet[2015]: W1213 14:34:29.845412 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.845571 kubelet[2015]: E1213 14:34:29.845429 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.845648 kubelet[2015]: E1213 14:34:29.845628 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.845712 kubelet[2015]: W1213 14:34:29.845649 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.845712 kubelet[2015]: E1213 14:34:29.845664 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.845886 kubelet[2015]: E1213 14:34:29.845862 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.845886 kubelet[2015]: W1213 14:34:29.845881 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.846039 kubelet[2015]: E1213 14:34:29.845896 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.846139 kubelet[2015]: E1213 14:34:29.846122 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.846199 kubelet[2015]: W1213 14:34:29.846141 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.846199 kubelet[2015]: E1213 14:34:29.846156 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.846409 kubelet[2015]: E1213 14:34:29.846391 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.846409 kubelet[2015]: W1213 14:34:29.846405 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.846691 kubelet[2015]: E1213 14:34:29.846420 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.846791 kubelet[2015]: E1213 14:34:29.846763 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.846791 kubelet[2015]: W1213 14:34:29.846783 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.846912 kubelet[2015]: E1213 14:34:29.846802 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.847054 kubelet[2015]: E1213 14:34:29.847030 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.847054 kubelet[2015]: W1213 14:34:29.847047 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.847239 kubelet[2015]: E1213 14:34:29.847063 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.847336 kubelet[2015]: E1213 14:34:29.847312 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.847336 kubelet[2015]: W1213 14:34:29.847333 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.847489 kubelet[2015]: E1213 14:34:29.847349 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.847592 kubelet[2015]: E1213 14:34:29.847570 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.847592 kubelet[2015]: W1213 14:34:29.847586 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.847740 kubelet[2015]: E1213 14:34:29.847601 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.847813 kubelet[2015]: E1213 14:34:29.847800 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.847872 kubelet[2015]: W1213 14:34:29.847816 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.847872 kubelet[2015]: E1213 14:34:29.847830 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.848055 kubelet[2015]: E1213 14:34:29.848033 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.848055 kubelet[2015]: W1213 14:34:29.848049 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.848228 kubelet[2015]: E1213 14:34:29.848064 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.848329 kubelet[2015]: E1213 14:34:29.848307 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.848329 kubelet[2015]: W1213 14:34:29.848324 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.848440 kubelet[2015]: E1213 14:34:29.848339 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.849564 kubelet[2015]: E1213 14:34:29.849544 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.849564 kubelet[2015]: W1213 14:34:29.849560 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.849740 kubelet[2015]: E1213 14:34:29.849577 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.849926 kubelet[2015]: E1213 14:34:29.849905 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.849926 kubelet[2015]: W1213 14:34:29.849921 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.850057 kubelet[2015]: E1213 14:34:29.849945 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.850297 kubelet[2015]: E1213 14:34:29.850278 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.850297 kubelet[2015]: W1213 14:34:29.850296 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.850463 kubelet[2015]: E1213 14:34:29.850318 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.850549 kubelet[2015]: E1213 14:34:29.850531 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.850626 kubelet[2015]: W1213 14:34:29.850551 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.850626 kubelet[2015]: E1213 14:34:29.850570 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.850779 kubelet[2015]: E1213 14:34:29.850767 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.850851 kubelet[2015]: W1213 14:34:29.850779 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.850851 kubelet[2015]: E1213 14:34:29.850794 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.851045 kubelet[2015]: E1213 14:34:29.851023 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.851045 kubelet[2015]: W1213 14:34:29.851040 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.851254 kubelet[2015]: E1213 14:34:29.851234 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.851423 kubelet[2015]: E1213 14:34:29.851255 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.851499 kubelet[2015]: W1213 14:34:29.851426 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.851499 kubelet[2015]: E1213 14:34:29.851443 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.851718 kubelet[2015]: E1213 14:34:29.851697 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.851794 kubelet[2015]: W1213 14:34:29.851725 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.851794 kubelet[2015]: E1213 14:34:29.851742 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.851990 kubelet[2015]: E1213 14:34:29.851970 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.852053 kubelet[2015]: W1213 14:34:29.851990 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.852053 kubelet[2015]: E1213 14:34:29.852016 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.852313 kubelet[2015]: E1213 14:34:29.852294 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.852386 kubelet[2015]: W1213 14:34:29.852323 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.852386 kubelet[2015]: E1213 14:34:29.852340 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.852738 kubelet[2015]: E1213 14:34:29.852717 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.852823 kubelet[2015]: W1213 14:34:29.852743 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.852823 kubelet[2015]: E1213 14:34:29.852765 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:29.853048 kubelet[2015]: E1213 14:34:29.853033 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:29.853164 kubelet[2015]: W1213 14:34:29.853141 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:29.853231 kubelet[2015]: E1213 14:34:29.853165 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.451474 kubelet[2015]: E1213 14:34:30.451421 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:30.707947 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount871815225.mount: Deactivated successfully. Dec 13 14:34:30.854240 kubelet[2015]: E1213 14:34:30.854203 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.854240 kubelet[2015]: W1213 14:34:30.854229 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.854835 kubelet[2015]: E1213 14:34:30.854255 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.854835 kubelet[2015]: E1213 14:34:30.854518 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.854835 kubelet[2015]: W1213 14:34:30.854531 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.854835 kubelet[2015]: E1213 14:34:30.854546 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.854835 kubelet[2015]: E1213 14:34:30.854759 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.854835 kubelet[2015]: W1213 14:34:30.854770 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.854835 kubelet[2015]: E1213 14:34:30.854785 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.855302 kubelet[2015]: E1213 14:34:30.855020 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.855302 kubelet[2015]: W1213 14:34:30.855034 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.855302 kubelet[2015]: E1213 14:34:30.855049 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.855486 kubelet[2015]: E1213 14:34:30.855341 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.855486 kubelet[2015]: W1213 14:34:30.855354 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.855486 kubelet[2015]: E1213 14:34:30.855368 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.855651 kubelet[2015]: E1213 14:34:30.855577 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.855651 kubelet[2015]: W1213 14:34:30.855589 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.855651 kubelet[2015]: E1213 14:34:30.855602 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.855827 kubelet[2015]: E1213 14:34:30.855798 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.855827 kubelet[2015]: W1213 14:34:30.855809 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.855827 kubelet[2015]: E1213 14:34:30.855822 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.856041 kubelet[2015]: E1213 14:34:30.856018 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.856041 kubelet[2015]: W1213 14:34:30.856036 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.856212 kubelet[2015]: E1213 14:34:30.856050 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.856345 kubelet[2015]: E1213 14:34:30.856323 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.856345 kubelet[2015]: W1213 14:34:30.856339 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.856494 kubelet[2015]: E1213 14:34:30.856356 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.856605 kubelet[2015]: E1213 14:34:30.856589 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.856605 kubelet[2015]: W1213 14:34:30.856603 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.856745 kubelet[2015]: E1213 14:34:30.856618 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.856836 kubelet[2015]: E1213 14:34:30.856816 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.856836 kubelet[2015]: W1213 14:34:30.856832 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.856964 kubelet[2015]: E1213 14:34:30.856846 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.857067 kubelet[2015]: E1213 14:34:30.857051 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.857067 kubelet[2015]: W1213 14:34:30.857063 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.857288 kubelet[2015]: E1213 14:34:30.857075 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.857288 kubelet[2015]: E1213 14:34:30.857281 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.857386 kubelet[2015]: W1213 14:34:30.857293 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.857386 kubelet[2015]: E1213 14:34:30.857306 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.857469 kubelet[2015]: E1213 14:34:30.857456 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.857469 kubelet[2015]: W1213 14:34:30.857465 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.857571 kubelet[2015]: E1213 14:34:30.857475 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.857633 kubelet[2015]: E1213 14:34:30.857620 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.857633 kubelet[2015]: W1213 14:34:30.857632 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.857723 kubelet[2015]: E1213 14:34:30.857643 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.857823 kubelet[2015]: E1213 14:34:30.857810 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.857881 kubelet[2015]: W1213 14:34:30.857824 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.857881 kubelet[2015]: E1213 14:34:30.857835 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.858024 kubelet[2015]: E1213 14:34:30.858006 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.858024 kubelet[2015]: W1213 14:34:30.858020 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.858155 kubelet[2015]: E1213 14:34:30.858032 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.858239 kubelet[2015]: E1213 14:34:30.858220 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.858239 kubelet[2015]: W1213 14:34:30.858232 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.858353 kubelet[2015]: E1213 14:34:30.858244 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.858420 kubelet[2015]: E1213 14:34:30.858403 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.858420 kubelet[2015]: W1213 14:34:30.858417 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.858521 kubelet[2015]: E1213 14:34:30.858429 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.858605 kubelet[2015]: E1213 14:34:30.858591 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.858605 kubelet[2015]: W1213 14:34:30.858602 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.858705 kubelet[2015]: E1213 14:34:30.858614 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.858854 kubelet[2015]: E1213 14:34:30.858837 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.858854 kubelet[2015]: W1213 14:34:30.858850 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.858962 kubelet[2015]: E1213 14:34:30.858864 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.859186 kubelet[2015]: E1213 14:34:30.859168 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.859186 kubelet[2015]: W1213 14:34:30.859181 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.859375 kubelet[2015]: E1213 14:34:30.859199 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.859427 kubelet[2015]: E1213 14:34:30.859409 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.859427 kubelet[2015]: W1213 14:34:30.859419 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.859509 kubelet[2015]: E1213 14:34:30.859431 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.859608 kubelet[2015]: E1213 14:34:30.859590 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.859608 kubelet[2015]: W1213 14:34:30.859604 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.859718 kubelet[2015]: E1213 14:34:30.859620 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.859793 kubelet[2015]: E1213 14:34:30.859776 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.859793 kubelet[2015]: W1213 14:34:30.859790 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.859894 kubelet[2015]: E1213 14:34:30.859804 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.860025 kubelet[2015]: E1213 14:34:30.860009 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.860025 kubelet[2015]: W1213 14:34:30.860022 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.860144 kubelet[2015]: E1213 14:34:30.860039 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.860470 kubelet[2015]: E1213 14:34:30.860447 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.860470 kubelet[2015]: W1213 14:34:30.860465 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.860605 kubelet[2015]: E1213 14:34:30.860483 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.860693 kubelet[2015]: E1213 14:34:30.860678 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.860693 kubelet[2015]: W1213 14:34:30.860690 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.860803 kubelet[2015]: E1213 14:34:30.860707 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.860926 kubelet[2015]: E1213 14:34:30.860906 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.860926 kubelet[2015]: W1213 14:34:30.860921 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.861028 kubelet[2015]: E1213 14:34:30.860939 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.861167 kubelet[2015]: E1213 14:34:30.861152 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.861220 kubelet[2015]: W1213 14:34:30.861172 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.861220 kubelet[2015]: E1213 14:34:30.861189 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.861519 kubelet[2015]: E1213 14:34:30.861504 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.861519 kubelet[2015]: W1213 14:34:30.861516 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.861625 kubelet[2015]: E1213 14:34:30.861533 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:30.861754 kubelet[2015]: E1213 14:34:30.861739 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:30.861754 kubelet[2015]: W1213 14:34:30.861752 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:30.861839 kubelet[2015]: E1213 14:34:30.861766 2015 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:31.299733 env[1430]: time="2024-12-13T14:34:31.299688968Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:31.360225 env[1430]: time="2024-12-13T14:34:31.360154434Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:31.364896 env[1430]: time="2024-12-13T14:34:31.364851709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:31.411006 env[1430]: time="2024-12-13T14:34:31.410956746Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:31.411623 env[1430]: time="2024-12-13T14:34:31.411588056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:34:31.414261 env[1430]: time="2024-12-13T14:34:31.414225998Z" level=info msg="CreateContainer within sandbox \"992d6ebeffc0fc0cfa877e49cacfff3c47876c67f4b051268085bbf546b4c203\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:34:31.452656 kubelet[2015]: E1213 14:34:31.452596 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:31.483769 kubelet[2015]: E1213 14:34:31.483720 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:31.666375 env[1430]: time="2024-12-13T14:34:31.666314428Z" level=info msg="CreateContainer within sandbox \"992d6ebeffc0fc0cfa877e49cacfff3c47876c67f4b051268085bbf546b4c203\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"efc7f2ce72495fff090ae3bb2478b4a90df6920bab5a2511ce3af514e671fc08\"" Dec 13 14:34:31.667322 env[1430]: time="2024-12-13T14:34:31.667284943Z" level=info msg="StartContainer for \"efc7f2ce72495fff090ae3bb2478b4a90df6920bab5a2511ce3af514e671fc08\"" Dec 13 14:34:31.693644 systemd[1]: Started cri-containerd-efc7f2ce72495fff090ae3bb2478b4a90df6920bab5a2511ce3af514e671fc08.scope. Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa46828fda8 items=0 ppid=2098 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:31.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633766326365373234393566666630393061653362623234373862 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.708000 audit: BPF prog-id=73 op=LOAD Dec 13 14:34:31.708000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002e89f8 items=0 ppid=2098 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:31.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633766326365373234393566666630393061653362623234373862 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit: BPF prog-id=74 op=LOAD Dec 13 14:34:31.709000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002e8a48 items=0 ppid=2098 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:31.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633766326365373234393566666630393061653362623234373862 Dec 13 14:34:31.709000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:34:31.709000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:31.709000 audit: BPF prog-id=75 op=LOAD Dec 13 14:34:31.709000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002e8ad8 items=0 ppid=2098 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:31.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633766326365373234393566666630393061653362623234373862 Dec 13 14:34:31.729722 env[1430]: time="2024-12-13T14:34:31.729656340Z" level=info msg="StartContainer for \"efc7f2ce72495fff090ae3bb2478b4a90df6920bab5a2511ce3af514e671fc08\" returns successfully" Dec 13 14:34:31.734957 systemd[1]: cri-containerd-efc7f2ce72495fff090ae3bb2478b4a90df6920bab5a2511ce3af514e671fc08.scope: Deactivated successfully. Dec 13 14:34:31.736000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:34:31.754789 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-efc7f2ce72495fff090ae3bb2478b4a90df6920bab5a2511ce3af514e671fc08-rootfs.mount: Deactivated successfully. Dec 13 14:34:32.453681 kubelet[2015]: E1213 14:34:32.453595 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:33.454478 kubelet[2015]: E1213 14:34:33.454414 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:34.153237 kubelet[2015]: E1213 14:34:33.483075 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:34.454933 kubelet[2015]: E1213 14:34:34.454749 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:35.455672 kubelet[2015]: E1213 14:34:35.455616 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:35.483745 kubelet[2015]: E1213 14:34:35.483314 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:36.456564 kubelet[2015]: E1213 14:34:36.456507 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:37.456765 kubelet[2015]: E1213 14:34:37.456686 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:37.483418 kubelet[2015]: E1213 14:34:37.483299 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:38.121683 env[1430]: time="2024-12-13T14:34:38.121619567Z" level=info msg="shim disconnected" id=efc7f2ce72495fff090ae3bb2478b4a90df6920bab5a2511ce3af514e671fc08 Dec 13 14:34:38.121683 env[1430]: time="2024-12-13T14:34:38.121681068Z" level=warning msg="cleaning up after shim disconnected" id=efc7f2ce72495fff090ae3bb2478b4a90df6920bab5a2511ce3af514e671fc08 namespace=k8s.io Dec 13 14:34:38.121683 env[1430]: time="2024-12-13T14:34:38.121691968Z" level=info msg="cleaning up dead shim" Dec 13 14:34:38.129381 env[1430]: time="2024-12-13T14:34:38.129331170Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2421 runtime=io.containerd.runc.v2\n" Dec 13 14:34:38.457850 kubelet[2015]: E1213 14:34:38.457723 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:38.781960 env[1430]: time="2024-12-13T14:34:38.781611975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:34:39.443180 kubelet[2015]: E1213 14:34:39.443126 2015 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:39.457934 kubelet[2015]: E1213 14:34:39.457899 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:39.483495 kubelet[2015]: E1213 14:34:39.483434 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:40.458384 kubelet[2015]: E1213 14:34:40.458321 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:41.458474 kubelet[2015]: E1213 14:34:41.458430 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:41.484885 kubelet[2015]: E1213 14:34:41.483287 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:42.459128 kubelet[2015]: E1213 14:34:42.459072 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:43.000251 env[1430]: time="2024-12-13T14:34:43.000195969Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:43.006514 env[1430]: time="2024-12-13T14:34:43.006478044Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:43.014325 env[1430]: time="2024-12-13T14:34:43.014293636Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:43.019330 env[1430]: time="2024-12-13T14:34:43.019298295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:43.019746 env[1430]: time="2024-12-13T14:34:43.019714400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:34:43.022213 env[1430]: time="2024-12-13T14:34:43.022183429Z" level=info msg="CreateContainer within sandbox \"992d6ebeffc0fc0cfa877e49cacfff3c47876c67f4b051268085bbf546b4c203\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:34:43.048603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount360656535.mount: Deactivated successfully. Dec 13 14:34:43.065033 env[1430]: time="2024-12-13T14:34:43.064984133Z" level=info msg="CreateContainer within sandbox \"992d6ebeffc0fc0cfa877e49cacfff3c47876c67f4b051268085bbf546b4c203\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1744169813b7c72d7b39990be34e3b543f08650809a8bdf454440a9898da660b\"" Dec 13 14:34:43.065508 env[1430]: time="2024-12-13T14:34:43.065477439Z" level=info msg="StartContainer for \"1744169813b7c72d7b39990be34e3b543f08650809a8bdf454440a9898da660b\"" Dec 13 14:34:43.094174 systemd[1]: run-containerd-runc-k8s.io-1744169813b7c72d7b39990be34e3b543f08650809a8bdf454440a9898da660b-runc.WSbDXJ.mount: Deactivated successfully. Dec 13 14:34:43.096795 systemd[1]: Started cri-containerd-1744169813b7c72d7b39990be34e3b543f08650809a8bdf454440a9898da660b.scope. Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.117885 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:34:43.117974 kernel: audit: type=1400 audit(1734100483.111:534): avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.134196 kernel: audit: type=1300 audit(1734100483.111:534): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f40bc63dec8 items=0 ppid=2098 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.111000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f40bc63dec8 items=0 ppid=2098 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343431363938313362376337326437623339393930626533346533 Dec 13 14:34:43.175009 kernel: audit: type=1327 audit(1734100483.111:534): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343431363938313362376337326437623339393930626533346533 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.190234 kernel: audit: type=1400 audit(1734100483.111:535): avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.218573 kernel: audit: type=1400 audit(1734100483.111:535): avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.218690 kernel: audit: type=1400 audit(1734100483.111:535): avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.219103 kernel: audit: type=1400 audit(1734100483.111:535): avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.224511 env[1430]: time="2024-12-13T14:34:43.224472814Z" level=info msg="StartContainer for \"1744169813b7c72d7b39990be34e3b543f08650809a8bdf454440a9898da660b\" returns successfully" Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.248453 kernel: audit: type=1400 audit(1734100483.111:535): avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.281924 kernel: audit: type=1400 audit(1734100483.111:535): avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.282046 kernel: audit: type=1400 audit(1734100483.111:535): avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit: BPF prog-id=76 op=LOAD Dec 13 14:34:43.111000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000360b28 items=0 ppid=2098 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343431363938313362376337326437623339393930626533346533 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit: BPF prog-id=77 op=LOAD Dec 13 14:34:43.111000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000360b78 items=0 ppid=2098 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343431363938313362376337326437623339393930626533346533 Dec 13 14:34:43.111000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:34:43.111000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.111000 audit: BPF prog-id=78 op=LOAD Dec 13 14:34:43.111000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000360c08 items=0 ppid=2098 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343431363938313362376337326437623339393930626533346533 Dec 13 14:34:43.459526 kubelet[2015]: E1213 14:34:43.459469 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:43.484106 kubelet[2015]: E1213 14:34:43.483258 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:44.459636 kubelet[2015]: E1213 14:34:44.459599 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:44.587957 env[1430]: time="2024-12-13T14:34:44.587885023Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:34:44.590053 systemd[1]: cri-containerd-1744169813b7c72d7b39990be34e3b543f08650809a8bdf454440a9898da660b.scope: Deactivated successfully. Dec 13 14:34:44.592771 kubelet[2015]: I1213 14:34:44.592746 2015 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:34:44.592000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:34:44.610870 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1744169813b7c72d7b39990be34e3b543f08650809a8bdf454440a9898da660b-rootfs.mount: Deactivated successfully. Dec 13 14:34:45.460674 kubelet[2015]: E1213 14:34:45.460611 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:45.487859 systemd[1]: Created slice kubepods-besteffort-podcb477b23_5d83_4ff1_b5ba_e29abf5e379d.slice. Dec 13 14:34:45.490303 env[1430]: time="2024-12-13T14:34:45.490268474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2tkgs,Uid:cb477b23-5d83-4ff1-b5ba-e29abf5e379d,Namespace:calico-system,Attempt:0,}" Dec 13 14:34:46.264722 env[1430]: time="2024-12-13T14:34:46.264675205Z" level=info msg="shim disconnected" id=1744169813b7c72d7b39990be34e3b543f08650809a8bdf454440a9898da660b Dec 13 14:34:46.264722 env[1430]: time="2024-12-13T14:34:46.264718606Z" level=warning msg="cleaning up after shim disconnected" id=1744169813b7c72d7b39990be34e3b543f08650809a8bdf454440a9898da660b namespace=k8s.io Dec 13 14:34:46.264722 env[1430]: time="2024-12-13T14:34:46.264729306Z" level=info msg="cleaning up dead shim" Dec 13 14:34:46.272424 env[1430]: time="2024-12-13T14:34:46.272373690Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2480 runtime=io.containerd.runc.v2\n" Dec 13 14:34:46.334332 env[1430]: time="2024-12-13T14:34:46.334246168Z" level=error msg="Failed to destroy network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:46.336493 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea-shm.mount: Deactivated successfully. Dec 13 14:34:46.337426 env[1430]: time="2024-12-13T14:34:46.337377503Z" level=error msg="encountered an error cleaning up failed sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:46.337630 env[1430]: time="2024-12-13T14:34:46.337584405Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2tkgs,Uid:cb477b23-5d83-4ff1-b5ba-e29abf5e379d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:46.338024 kubelet[2015]: E1213 14:34:46.337985 2015 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:46.338149 kubelet[2015]: E1213 14:34:46.338059 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2tkgs" Dec 13 14:34:46.338149 kubelet[2015]: E1213 14:34:46.338106 2015 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2tkgs" Dec 13 14:34:46.338243 kubelet[2015]: E1213 14:34:46.338169 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2tkgs_calico-system(cb477b23-5d83-4ff1-b5ba-e29abf5e379d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2tkgs_calico-system(cb477b23-5d83-4ff1-b5ba-e29abf5e379d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:46.461104 kubelet[2015]: E1213 14:34:46.461052 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:46.798717 env[1430]: time="2024-12-13T14:34:46.798674763Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:34:46.799024 kubelet[2015]: I1213 14:34:46.798999 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:34:46.799667 env[1430]: time="2024-12-13T14:34:46.799635673Z" level=info msg="StopPodSandbox for \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\"" Dec 13 14:34:46.830257 env[1430]: time="2024-12-13T14:34:46.830204109Z" level=error msg="StopPodSandbox for \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\" failed" error="failed to destroy network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:46.830444 kubelet[2015]: E1213 14:34:46.830408 2015 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:34:46.830545 kubelet[2015]: E1213 14:34:46.830462 2015 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea"} Dec 13 14:34:46.830545 kubelet[2015]: E1213 14:34:46.830526 2015 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb477b23-5d83-4ff1-b5ba-e29abf5e379d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:46.830707 kubelet[2015]: E1213 14:34:46.830556 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb477b23-5d83-4ff1-b5ba-e29abf5e379d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2tkgs" podUID="cb477b23-5d83-4ff1-b5ba-e29abf5e379d" Dec 13 14:34:47.461691 kubelet[2015]: E1213 14:34:47.461624 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:48.269220 kubelet[2015]: I1213 14:34:48.268177 2015 topology_manager.go:215] "Topology Admit Handler" podUID="f8ace1c2-8665-4a3e-8ec5-bf6f46643d01" podNamespace="default" podName="nginx-deployment-85f456d6dd-vwlfp" Dec 13 14:34:48.273564 kubelet[2015]: I1213 14:34:48.273521 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wb474\" (UniqueName: \"kubernetes.io/projected/f8ace1c2-8665-4a3e-8ec5-bf6f46643d01-kube-api-access-wb474\") pod \"nginx-deployment-85f456d6dd-vwlfp\" (UID: \"f8ace1c2-8665-4a3e-8ec5-bf6f46643d01\") " pod="default/nginx-deployment-85f456d6dd-vwlfp" Dec 13 14:34:48.276335 systemd[1]: Created slice kubepods-besteffort-podf8ace1c2_8665_4a3e_8ec5_bf6f46643d01.slice. Dec 13 14:34:48.462912 kubelet[2015]: E1213 14:34:48.462749 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:48.583168 env[1430]: time="2024-12-13T14:34:48.582745082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-vwlfp,Uid:f8ace1c2-8665-4a3e-8ec5-bf6f46643d01,Namespace:default,Attempt:0,}" Dec 13 14:34:49.464621 kubelet[2015]: E1213 14:34:49.464584 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:49.763564 env[1430]: time="2024-12-13T14:34:49.759707914Z" level=error msg="Failed to destroy network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:49.763564 env[1430]: time="2024-12-13T14:34:49.762568743Z" level=error msg="encountered an error cleaning up failed sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:49.763564 env[1430]: time="2024-12-13T14:34:49.762658244Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-vwlfp,Uid:f8ace1c2-8665-4a3e-8ec5-bf6f46643d01,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:49.764023 kubelet[2015]: E1213 14:34:49.762918 2015 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:49.764023 kubelet[2015]: E1213 14:34:49.762996 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-vwlfp" Dec 13 14:34:49.764023 kubelet[2015]: E1213 14:34:49.763036 2015 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-vwlfp" Dec 13 14:34:49.762364 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df-shm.mount: Deactivated successfully. Dec 13 14:34:49.764416 kubelet[2015]: E1213 14:34:49.763115 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-vwlfp_default(f8ace1c2-8665-4a3e-8ec5-bf6f46643d01)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-vwlfp_default(f8ace1c2-8665-4a3e-8ec5-bf6f46643d01)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-vwlfp" podUID="f8ace1c2-8665-4a3e-8ec5-bf6f46643d01" Dec 13 14:34:49.806029 kubelet[2015]: I1213 14:34:49.805402 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:34:49.806369 env[1430]: time="2024-12-13T14:34:49.806342490Z" level=info msg="StopPodSandbox for \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\"" Dec 13 14:34:49.874124 env[1430]: time="2024-12-13T14:34:49.874042983Z" level=error msg="StopPodSandbox for \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\" failed" error="failed to destroy network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:49.874364 kubelet[2015]: E1213 14:34:49.874324 2015 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:34:49.874473 kubelet[2015]: E1213 14:34:49.874391 2015 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df"} Dec 13 14:34:49.874473 kubelet[2015]: E1213 14:34:49.874439 2015 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f8ace1c2-8665-4a3e-8ec5-bf6f46643d01\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:49.874598 kubelet[2015]: E1213 14:34:49.874470 2015 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f8ace1c2-8665-4a3e-8ec5-bf6f46643d01\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-vwlfp" podUID="f8ace1c2-8665-4a3e-8ec5-bf6f46643d01" Dec 13 14:34:50.465681 kubelet[2015]: E1213 14:34:50.465594 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:51.466330 kubelet[2015]: E1213 14:34:51.466254 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:52.466541 kubelet[2015]: E1213 14:34:52.466477 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:53.242372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount250572531.mount: Deactivated successfully. Dec 13 14:34:53.297331 env[1430]: time="2024-12-13T14:34:53.297270940Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:53.307433 env[1430]: time="2024-12-13T14:34:53.307391234Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:53.311835 env[1430]: time="2024-12-13T14:34:53.311750375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:53.318016 env[1430]: time="2024-12-13T14:34:53.317917732Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:53.318557 env[1430]: time="2024-12-13T14:34:53.318528938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:34:53.334586 env[1430]: time="2024-12-13T14:34:53.334556088Z" level=info msg="CreateContainer within sandbox \"992d6ebeffc0fc0cfa877e49cacfff3c47876c67f4b051268085bbf546b4c203\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:34:53.368179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3036801187.mount: Deactivated successfully. Dec 13 14:34:53.383461 env[1430]: time="2024-12-13T14:34:53.383396943Z" level=info msg="CreateContainer within sandbox \"992d6ebeffc0fc0cfa877e49cacfff3c47876c67f4b051268085bbf546b4c203\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e5bca144f252363d7996c67cffb69f87028dae74ee2103eb3e25bdd096fd9845\"" Dec 13 14:34:53.384105 env[1430]: time="2024-12-13T14:34:53.384047849Z" level=info msg="StartContainer for \"e5bca144f252363d7996c67cffb69f87028dae74ee2103eb3e25bdd096fd9845\"" Dec 13 14:34:53.401923 systemd[1]: Started cri-containerd-e5bca144f252363d7996c67cffb69f87028dae74ee2103eb3e25bdd096fd9845.scope. Dec 13 14:34:53.445039 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:34:53.445305 kernel: audit: type=1400 audit(1734100493.421:541): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.421000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.421000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f70edd0e588 items=0 ppid=2098 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:53.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626361313434663235323336336437393936633637636666623639 Dec 13 14:34:53.467480 kubelet[2015]: E1213 14:34:53.467437 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:53.486854 env[1430]: time="2024-12-13T14:34:53.486814308Z" level=info msg="StartContainer for \"e5bca144f252363d7996c67cffb69f87028dae74ee2103eb3e25bdd096fd9845\" returns successfully" Dec 13 14:34:53.487236 kernel: audit: type=1300 audit(1734100493.421:541): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f70edd0e588 items=0 ppid=2098 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:53.487324 kernel: audit: type=1327 audit(1734100493.421:541): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626361313434663235323336336437393936633637636666623639 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.503422 kernel: audit: type=1400 audit(1734100493.424:542): avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.518090 kernel: audit: type=1400 audit(1734100493.424:542): avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.545046 kernel: audit: type=1400 audit(1734100493.424:542): avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.545143 kernel: audit: type=1400 audit(1734100493.424:542): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.574876 kernel: audit: type=1400 audit(1734100493.424:542): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.574954 kernel: audit: type=1400 audit(1734100493.424:542): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.574998 kernel: audit: type=1400 audit(1734100493.424:542): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.424000 audit: BPF prog-id=79 op=LOAD Dec 13 14:34:53.424000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0003d8228 items=0 ppid=2098 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:53.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626361313434663235323336336437393936633637636666623639 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit: BPF prog-id=80 op=LOAD Dec 13 14:34:53.444000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0003d8278 items=0 ppid=2098 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:53.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626361313434663235323336336437393936633637636666623639 Dec 13 14:34:53.444000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:34:53.444000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:53.444000 audit: BPF prog-id=81 op=LOAD Dec 13 14:34:53.444000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0003d8308 items=0 ppid=2098 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:53.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626361313434663235323336336437393936633637636666623639 Dec 13 14:34:53.656302 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:34:53.656487 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:34:53.833247 kubelet[2015]: I1213 14:34:53.833115 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-gxmjb" podStartSLOduration=5.34280934 podStartE2EDuration="34.833067539s" podCreationTimestamp="2024-12-13 14:34:19 +0000 UTC" firstStartedPulling="2024-12-13 14:34:23.829142147 +0000 UTC m=+5.044627686" lastFinishedPulling="2024-12-13 14:34:53.319400346 +0000 UTC m=+34.534885885" observedRunningTime="2024-12-13 14:34:53.832586135 +0000 UTC m=+35.048071774" watchObservedRunningTime="2024-12-13 14:34:53.833067539 +0000 UTC m=+35.048553078" Dec 13 14:34:54.467609 kubelet[2015]: E1213 14:34:54.467548 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:54.839863 systemd[1]: run-containerd-runc-k8s.io-e5bca144f252363d7996c67cffb69f87028dae74ee2103eb3e25bdd096fd9845-runc.zOj3Nw.mount: Deactivated successfully. Dec 13 14:34:54.978000 audit[2753]: AVC avc: denied { write } for pid=2753 comm="tee" name="fd" dev="proc" ino=23224 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:54.978000 audit[2753]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7d2f9a0d a2=241 a3=1b6 items=1 ppid=2725 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.978000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:34:54.978000 audit: PATH item=0 name="/dev/fd/63" inode=23219 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:54.978000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:54.987000 audit[2762]: AVC avc: denied { write } for pid=2762 comm="tee" name="fd" dev="proc" ino=23233 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:54.987000 audit[2762]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff55fd2a1f a2=241 a3=1b6 items=1 ppid=2730 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.987000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:34:54.987000 audit: PATH item=0 name="/dev/fd/63" inode=23226 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:54.987000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:54.993000 audit[2764]: AVC avc: denied { write } for pid=2764 comm="tee" name="fd" dev="proc" ino=24126 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:54.993000 audit[2764]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2843ca0e a2=241 a3=1b6 items=1 ppid=2729 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.998000 audit[2767]: AVC avc: denied { write } for pid=2767 comm="tee" name="fd" dev="proc" ino=23239 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:55.000000 audit[2771]: AVC avc: denied { write } for pid=2771 comm="tee" name="fd" dev="proc" ino=24130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:55.000000 audit[2771]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0a282a1d a2=241 a3=1b6 items=1 ppid=2720 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.998000 audit[2767]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4fad6a1d a2=241 a3=1b6 items=1 ppid=2727 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.998000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:34:54.998000 audit: PATH item=0 name="/dev/fd/63" inode=23230 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:54.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:54.993000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:34:54.993000 audit: PATH item=0 name="/dev/fd/63" inode=24113 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:54.993000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:55.004000 audit[2770]: AVC avc: denied { write } for pid=2770 comm="tee" name="fd" dev="proc" ino=23243 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:55.000000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:34:55.000000 audit: PATH item=0 name="/dev/fd/63" inode=24120 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:55.000000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:55.004000 audit[2770]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcea094a1d a2=241 a3=1b6 items=1 ppid=2724 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.004000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:34:55.004000 audit: PATH item=0 name="/dev/fd/63" inode=23235 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:55.004000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:55.008000 audit[2774]: AVC avc: denied { write } for pid=2774 comm="tee" name="fd" dev="proc" ino=23247 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:55.008000 audit[2774]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0e681a1e a2=241 a3=1b6 items=1 ppid=2721 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.008000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:34:55.008000 audit: PATH item=0 name="/dev/fd/63" inode=24123 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:55.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:55.189000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.189000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.189000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.189000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.189000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.189000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.189000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.189000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.189000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.189000 audit: BPF prog-id=82 op=LOAD Dec 13 14:34:55.189000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc40212450 a2=98 a3=3 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.189000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.190000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit: BPF prog-id=83 op=LOAD Dec 13 14:34:55.190000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc40212230 a2=74 a3=540051 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.190000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.190000 audit: BPF prog-id=84 op=LOAD Dec 13 14:34:55.190000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc40212260 a2=94 a3=2 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.190000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit: BPF prog-id=85 op=LOAD Dec 13 14:34:55.304000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc40212120 a2=40 a3=1 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.304000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:34:55.304000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.304000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc402121f0 a2=50 a3=7ffc402122d0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc40212130 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40212160 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40212070 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc40212180 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc40212160 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc40212150 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc40212180 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40212160 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40212180 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc40212150 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc402121c0 a2=28 a3=0 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc40211f70 a2=50 a3=1 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit: BPF prog-id=86 op=LOAD Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc40211f70 a2=94 a3=5 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc40212020 a2=50 a3=1 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc40212140 a2=4 a3=38 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.314000 audit[2830]: AVC avc: denied { confidentiality } for pid=2830 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:55.314000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc40212190 a2=94 a3=6 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.314000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { confidentiality } for pid=2830 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:55.315000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc40211940 a2=94 a3=83 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.315000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.315000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc40211940 a2=94 a3=83 items=0 ppid=2722 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.315000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit: BPF prog-id=87 op=LOAD Dec 13 14:34:55.324000 audit[2833]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb699abf0 a2=98 a3=1999999999999999 items=0 ppid=2722 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.324000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:55.324000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit: BPF prog-id=88 op=LOAD Dec 13 14:34:55.324000 audit[2833]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb699aad0 a2=74 a3=ffff items=0 ppid=2722 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.324000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:55.324000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.324000 audit: BPF prog-id=89 op=LOAD Dec 13 14:34:55.324000 audit[2833]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb699ab10 a2=40 a3=7ffcb699acf0 items=0 ppid=2722 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.324000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:55.324000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:34:55.397209 systemd-networkd[1599]: vxlan.calico: Link UP Dec 13 14:34:55.397219 systemd-networkd[1599]: vxlan.calico: Gained carrier Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit: BPF prog-id=90 op=LOAD Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcef84e740 a2=98 a3=ffffffff items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit: BPF prog-id=91 op=LOAD Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcef84e550 a2=74 a3=540051 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit: BPF prog-id=92 op=LOAD Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcef84e580 a2=94 a3=2 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef84e450 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef84e480 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef84e390 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef84e4a0 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef84e480 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef84e470 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef84e4a0 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef84e480 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef84e4a0 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcef84e470 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcef84e4e0 a2=28 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.421000 audit: BPF prog-id=93 op=LOAD Dec 13 14:34:55.421000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcef84e350 a2=40 a3=0 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.422000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcef84e340 a2=50 a3=2800 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcef84e340 a2=50 a3=2800 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.422000 audit: BPF prog-id=94 op=LOAD Dec 13 14:34:55.422000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcef84db60 a2=94 a3=2 items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.425000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.425000 audit: BPF prog-id=95 op=LOAD Dec 13 14:34:55.425000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcef84dc60 a2=94 a3=2d items=0 ppid=2722 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit: BPF prog-id=96 op=LOAD Dec 13 14:34:55.429000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe81814dc0 a2=98 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.429000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.429000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit: BPF prog-id=97 op=LOAD Dec 13 14:34:55.429000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe81814ba0 a2=74 a3=540051 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.429000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.429000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.429000 audit: BPF prog-id=98 op=LOAD Dec 13 14:34:55.429000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe81814bd0 a2=94 a3=2 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.429000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.430000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:34:55.468357 kubelet[2015]: E1213 14:34:55.468325 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit: BPF prog-id=99 op=LOAD Dec 13 14:34:55.561000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe81814a90 a2=40 a3=1 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.561000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.561000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:34:55.561000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.561000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe81814b60 a2=50 a3=7ffe81814c40 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.561000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe81814aa0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe81814ad0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe818149e0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe81814af0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe81814ad0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe81814ac0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe81814af0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe81814ad0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe81814af0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.570000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.570000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe81814ac0 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe81814b30 a2=28 a3=0 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.571000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe818148e0 a2=50 a3=1 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.571000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit: BPF prog-id=100 op=LOAD Dec 13 14:34:55.571000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe818148e0 a2=94 a3=5 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.571000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.571000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe81814990 a2=50 a3=1 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.571000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe81814ab0 a2=4 a3=38 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.571000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { confidentiality } for pid=2864 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:55.571000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe81814b00 a2=94 a3=6 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.571000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { confidentiality } for pid=2864 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:55.571000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe818142b0 a2=94 a3=83 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.571000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: AVC avc: denied { perfmon } for pid=2864 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.571000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe818142b0 a2=94 a3=83 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.571000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.572000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.572000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe81815cf0 a2=10 a3=f1f00800 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.572000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.572000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.572000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe81815b90 a2=10 a3=3 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.572000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.572000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.572000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe81815b30 a2=10 a3=3 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.572000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.572000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.572000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe81815b30 a2=10 a3=7 items=0 ppid=2722 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.572000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:55.453000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:34:55.453000 audit[1413]: SYSCALL arch=c000003e syscall=232 success=yes exit=2 a0=4 a1=7ffdfb9740c0 a2=40 a3=ffffffff items=0 ppid=1 pid=1413 auid=4294967295 uid=201 gid=201 euid=201 suid=201 fsuid=201 egid=201 sgid=201 fsgid=201 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F646275732D6461656D6F6E002D2D73797374656D002D2D616464726573733D73797374656D643A002D2D6E6F666F726B002D2D6E6F70696466696C65002D2D73797374656D642D61637469766174696F6E002D2D7379736C6F672D6F6E6C79 Dec 13 14:34:55.648000 audit[2889]: NETFILTER_CFG table=mangle:69 family=2 entries=16 op=nft_register_chain pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:55.648000 audit[2889]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc20de8ea0 a2=0 a3=7ffc20de8e8c items=0 ppid=2722 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.648000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:55.663000 audit[2891]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:55.663000 audit[2891]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffb6c372a0 a2=0 a3=7fffb6c3728c items=0 ppid=2722 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.663000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:55.664000 audit[2890]: NETFILTER_CFG table=nat:71 family=2 entries=15 op=nft_register_chain pid=2890 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:55.664000 audit[2890]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe6ba6abd0 a2=0 a3=7ffe6ba6abbc items=0 ppid=2722 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.664000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:55.669000 audit[2888]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=2888 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:55.669000 audit[2888]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffca4e19e70 a2=0 a3=7ffca4e19e5c items=0 ppid=2722 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.669000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:56.468710 kubelet[2015]: E1213 14:34:56.468660 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:56.777352 systemd-networkd[1599]: vxlan.calico: Gained IPv6LL Dec 13 14:34:57.469830 kubelet[2015]: E1213 14:34:57.469764 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:58.471000 kubelet[2015]: E1213 14:34:58.470944 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:59.443785 kubelet[2015]: E1213 14:34:59.443728 2015 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:59.471401 kubelet[2015]: E1213 14:34:59.471343 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:00.471998 kubelet[2015]: E1213 14:35:00.471939 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:00.483934 env[1430]: time="2024-12-13T14:35:00.483886266Z" level=info msg="StopPodSandbox for \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\"" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.528 [INFO][2919] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.528 [INFO][2919] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" iface="eth0" netns="/var/run/netns/cni-44d22659-9958-7ce0-bb1f-5d11209da77d" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.529 [INFO][2919] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" iface="eth0" netns="/var/run/netns/cni-44d22659-9958-7ce0-bb1f-5d11209da77d" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.529 [INFO][2919] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" iface="eth0" netns="/var/run/netns/cni-44d22659-9958-7ce0-bb1f-5d11209da77d" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.529 [INFO][2919] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.529 [INFO][2919] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.549 [INFO][2925] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" HandleID="k8s-pod-network.05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.549 [INFO][2925] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.549 [INFO][2925] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.557 [WARNING][2925] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" HandleID="k8s-pod-network.05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.557 [INFO][2925] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" HandleID="k8s-pod-network.05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.558 [INFO][2925] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:00.561623 env[1430]: 2024-12-13 14:35:00.560 [INFO][2919] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:00.565354 systemd[1]: run-netns-cni\x2d44d22659\x2d9958\x2d7ce0\x2dbb1f\x2d5d11209da77d.mount: Deactivated successfully. Dec 13 14:35:00.566653 env[1430]: time="2024-12-13T14:35:00.566614730Z" level=info msg="TearDown network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\" successfully" Dec 13 14:35:00.566653 env[1430]: time="2024-12-13T14:35:00.566650130Z" level=info msg="StopPodSandbox for \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\" returns successfully" Dec 13 14:35:00.567328 env[1430]: time="2024-12-13T14:35:00.567295835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2tkgs,Uid:cb477b23-5d83-4ff1-b5ba-e29abf5e379d,Namespace:calico-system,Attempt:1,}" Dec 13 14:35:00.719798 systemd-networkd[1599]: cali1ce6c126bee: Link UP Dec 13 14:35:00.730687 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:35:00.730792 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1ce6c126bee: link becomes ready Dec 13 14:35:00.731602 systemd-networkd[1599]: cali1ce6c126bee: Gained carrier Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.647 [INFO][2932] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-csi--node--driver--2tkgs-eth0 csi-node-driver- calico-system cb477b23-5d83-4ff1-b5ba-e29abf5e379d 1427 0 2024-12-13 14:34:19 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.8.15 csi-node-driver-2tkgs eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1ce6c126bee [] []}} ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Namespace="calico-system" Pod="csi-node-driver-2tkgs" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--2tkgs-" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.647 [INFO][2932] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Namespace="calico-system" Pod="csi-node-driver-2tkgs" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.677 [INFO][2944] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" HandleID="k8s-pod-network.23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.687 [INFO][2944] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" HandleID="k8s-pod-network.23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000319d30), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.15", "pod":"csi-node-driver-2tkgs", "timestamp":"2024-12-13 14:35:00.677483219 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.688 [INFO][2944] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.688 [INFO][2944] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.688 [INFO][2944] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.689 [INFO][2944] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" host="10.200.8.15" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.694 [INFO][2944] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.698 [INFO][2944] ipam/ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.699 [INFO][2944] ipam/ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.701 [INFO][2944] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.701 [INFO][2944] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" host="10.200.8.15" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.702 [INFO][2944] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.706 [INFO][2944] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" host="10.200.8.15" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.713 [INFO][2944] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.44.65/26] block=192.168.44.64/26 handle="k8s-pod-network.23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" host="10.200.8.15" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.713 [INFO][2944] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.65/26] handle="k8s-pod-network.23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" host="10.200.8.15" Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.713 [INFO][2944] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:00.745569 env[1430]: 2024-12-13 14:35:00.713 [INFO][2944] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.44.65/26] IPv6=[] ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" HandleID="k8s-pod-network.23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.748592 env[1430]: 2024-12-13 14:35:00.715 [INFO][2932] cni-plugin/k8s.go 386: Populated endpoint ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Namespace="calico-system" Pod="csi-node-driver-2tkgs" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--2tkgs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb477b23-5d83-4ff1-b5ba-e29abf5e379d", ResourceVersion:"1427", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"csi-node-driver-2tkgs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1ce6c126bee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:00.748592 env[1430]: 2024-12-13 14:35:00.715 [INFO][2932] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.44.65/32] ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Namespace="calico-system" Pod="csi-node-driver-2tkgs" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.748592 env[1430]: 2024-12-13 14:35:00.715 [INFO][2932] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1ce6c126bee ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Namespace="calico-system" Pod="csi-node-driver-2tkgs" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.748592 env[1430]: 2024-12-13 14:35:00.732 [INFO][2932] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Namespace="calico-system" Pod="csi-node-driver-2tkgs" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.748592 env[1430]: 2024-12-13 14:35:00.732 [INFO][2932] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Namespace="calico-system" Pod="csi-node-driver-2tkgs" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--2tkgs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb477b23-5d83-4ff1-b5ba-e29abf5e379d", ResourceVersion:"1427", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c", Pod:"csi-node-driver-2tkgs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1ce6c126bee", MAC:"e2:2a:e7:22:f5:00", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:00.748592 env[1430]: 2024-12-13 14:35:00.744 [INFO][2932] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c" Namespace="calico-system" Pod="csi-node-driver-2tkgs" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:00.757000 audit[2973]: NETFILTER_CFG table=filter:73 family=2 entries=34 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:35:00.763756 kernel: kauditd_printk_skb: 562 callbacks suppressed Dec 13 14:35:00.763867 kernel: audit: type=1325 audit(1734100500.757:649): table=filter:73 family=2 entries=34 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:35:00.757000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff2cd55f50 a2=0 a3=7fff2cd55f3c items=0 ppid=2722 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:00.786352 env[1430]: time="2024-12-13T14:35:00.785672286Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:35:00.786352 env[1430]: time="2024-12-13T14:35:00.785735487Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:35:00.786352 env[1430]: time="2024-12-13T14:35:00.785757487Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:35:00.786352 env[1430]: time="2024-12-13T14:35:00.785966789Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c pid=2980 runtime=io.containerd.runc.v2 Dec 13 14:35:00.801144 kernel: audit: type=1300 audit(1734100500.757:649): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff2cd55f50 a2=0 a3=7fff2cd55f3c items=0 ppid=2722 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:00.757000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:35:00.807182 systemd[1]: Started cri-containerd-23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c.scope. Dec 13 14:35:00.814939 kernel: audit: type=1327 audit(1734100500.757:649): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:35:00.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.844256 kernel: audit: type=1400 audit(1734100500.829:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.871230 kernel: audit: type=1400 audit(1734100500.829:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.871312 kernel: audit: type=1400 audit(1734100500.829:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.871336 kernel: audit: type=1400 audit(1734100500.829:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.903040 kernel: audit: type=1400 audit(1734100500.829:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.903140 kernel: audit: type=1400 audit(1734100500.829:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.930136 kernel: audit: type=1400 audit(1734100500.829:656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.857000 audit: BPF prog-id=101 op=LOAD Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2980 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:00.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643936633934363663666138663662316631346533333738303536 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2980 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:00.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643936633934363663666138663662316631346533333738303536 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.863000 audit: BPF prog-id=102 op=LOAD Dec 13 14:35:00.863000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001ad1d0 items=0 ppid=2980 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:00.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643936633934363663666138663662316631346533333738303536 Dec 13 14:35:00.885000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.885000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.885000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.885000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.885000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.885000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.885000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.885000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.885000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.885000 audit: BPF prog-id=103 op=LOAD Dec 13 14:35:00.885000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001ad218 items=0 ppid=2980 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:00.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643936633934363663666138663662316631346533333738303536 Dec 13 14:35:00.916000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:35:00.916000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:00.916000 audit: BPF prog-id=104 op=LOAD Dec 13 14:35:00.916000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001ad628 items=0 ppid=2980 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:00.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643936633934363663666138663662316631346533333738303536 Dec 13 14:35:00.942329 env[1430]: time="2024-12-13T14:35:00.942194342Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2tkgs,Uid:cb477b23-5d83-4ff1-b5ba-e29abf5e379d,Namespace:calico-system,Attempt:1,} returns sandbox id \"23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c\"" Dec 13 14:35:00.944062 env[1430]: time="2024-12-13T14:35:00.944029556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:35:01.472698 kubelet[2015]: E1213 14:35:01.472641 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:02.473307 systemd-networkd[1599]: cali1ce6c126bee: Gained IPv6LL Dec 13 14:35:02.473915 kubelet[2015]: E1213 14:35:02.473852 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:02.913641 env[1430]: time="2024-12-13T14:35:02.913587392Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:02.925162 env[1430]: time="2024-12-13T14:35:02.925124281Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:02.930741 env[1430]: time="2024-12-13T14:35:02.930653423Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:02.937428 env[1430]: time="2024-12-13T14:35:02.937397075Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:02.937803 env[1430]: time="2024-12-13T14:35:02.937772178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:35:02.940038 env[1430]: time="2024-12-13T14:35:02.940007795Z" level=info msg="CreateContainer within sandbox \"23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:35:02.969825 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4000069979.mount: Deactivated successfully. Dec 13 14:35:02.987680 env[1430]: time="2024-12-13T14:35:02.987634562Z" level=info msg="CreateContainer within sandbox \"23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"52222ae2414a43d5ef62b6aa907b2aa15b51e64bbc23de64770f9939bcf59942\"" Dec 13 14:35:02.988218 env[1430]: time="2024-12-13T14:35:02.988181266Z" level=info msg="StartContainer for \"52222ae2414a43d5ef62b6aa907b2aa15b51e64bbc23de64770f9939bcf59942\"" Dec 13 14:35:03.017875 systemd[1]: Started cri-containerd-52222ae2414a43d5ef62b6aa907b2aa15b51e64bbc23de64770f9939bcf59942.scope. Dec 13 14:35:03.032000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.032000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fdf5c6b6018 items=0 ppid=2980 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532323232616532343134613433643565663632623661613930376232 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit: BPF prog-id=105 op=LOAD Dec 13 14:35:03.033000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000388208 items=0 ppid=2980 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532323232616532343134613433643565663632623661613930376232 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.033000 audit: BPF prog-id=106 op=LOAD Dec 13 14:35:03.033000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000388258 items=0 ppid=2980 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532323232616532343134613433643565663632623661613930376232 Dec 13 14:35:03.034000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:35:03.034000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.034000 audit: BPF prog-id=107 op=LOAD Dec 13 14:35:03.034000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0003882e8 items=0 ppid=2980 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532323232616532343134613433643565663632623661613930376232 Dec 13 14:35:03.054369 env[1430]: time="2024-12-13T14:35:03.054297666Z" level=info msg="StartContainer for \"52222ae2414a43d5ef62b6aa907b2aa15b51e64bbc23de64770f9939bcf59942\" returns successfully" Dec 13 14:35:03.056455 env[1430]: time="2024-12-13T14:35:03.056431282Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:35:03.474684 kubelet[2015]: E1213 14:35:03.474645 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:03.484367 env[1430]: time="2024-12-13T14:35:03.483919106Z" level=info msg="StopPodSandbox for \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\"" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.528 [INFO][3061] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.528 [INFO][3061] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" iface="eth0" netns="/var/run/netns/cni-56ef980d-afa1-0db4-8c6a-0a62571fed55" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.528 [INFO][3061] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" iface="eth0" netns="/var/run/netns/cni-56ef980d-afa1-0db4-8c6a-0a62571fed55" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.529 [INFO][3061] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" iface="eth0" netns="/var/run/netns/cni-56ef980d-afa1-0db4-8c6a-0a62571fed55" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.529 [INFO][3061] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.529 [INFO][3061] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.547 [INFO][3067] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" HandleID="k8s-pod-network.1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.548 [INFO][3067] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.548 [INFO][3067] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.555 [WARNING][3067] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" HandleID="k8s-pod-network.1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.555 [INFO][3067] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" HandleID="k8s-pod-network.1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.557 [INFO][3067] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:03.560166 env[1430]: 2024-12-13 14:35:03.558 [INFO][3061] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:03.560166 env[1430]: time="2024-12-13T14:35:03.560028480Z" level=info msg="TearDown network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\" successfully" Dec 13 14:35:03.560166 env[1430]: time="2024-12-13T14:35:03.560091480Z" level=info msg="StopPodSandbox for \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\" returns successfully" Dec 13 14:35:03.560873 env[1430]: time="2024-12-13T14:35:03.560735185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-vwlfp,Uid:f8ace1c2-8665-4a3e-8ec5-bf6f46643d01,Namespace:default,Attempt:1,}" Dec 13 14:35:03.712047 systemd-networkd[1599]: calie8700385ee2: Link UP Dec 13 14:35:03.719172 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:35:03.728797 systemd-networkd[1599]: calie8700385ee2: Gained carrier Dec 13 14:35:03.729738 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie8700385ee2: link becomes ready Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.640 [INFO][3074] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0 nginx-deployment-85f456d6dd- default f8ace1c2-8665-4a3e-8ec5-bf6f46643d01 1441 0 2024-12-13 14:34:48 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.15 nginx-deployment-85f456d6dd-vwlfp eth0 default [] [] [kns.default ksa.default.default] calie8700385ee2 [] []}} ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Namespace="default" Pod="nginx-deployment-85f456d6dd-vwlfp" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.640 [INFO][3074] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Namespace="default" Pod="nginx-deployment-85f456d6dd-vwlfp" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.665 [INFO][3085] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" HandleID="k8s-pod-network.fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.676 [INFO][3085] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" HandleID="k8s-pod-network.fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290810), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.15", "pod":"nginx-deployment-85f456d6dd-vwlfp", "timestamp":"2024-12-13 14:35:03.665368674 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.676 [INFO][3085] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.676 [INFO][3085] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.676 [INFO][3085] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.678 [INFO][3085] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" host="10.200.8.15" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.681 [INFO][3085] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.685 [INFO][3085] ipam/ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.687 [INFO][3085] ipam/ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.688 [INFO][3085] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.689 [INFO][3085] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" host="10.200.8.15" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.690 [INFO][3085] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.694 [INFO][3085] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" host="10.200.8.15" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.707 [INFO][3085] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.44.66/26] block=192.168.44.64/26 handle="k8s-pod-network.fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" host="10.200.8.15" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.707 [INFO][3085] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.66/26] handle="k8s-pod-network.fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" host="10.200.8.15" Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.707 [INFO][3085] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:03.744528 env[1430]: 2024-12-13 14:35:03.707 [INFO][3085] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.44.66/26] IPv6=[] ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" HandleID="k8s-pod-network.fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.745277 env[1430]: 2024-12-13 14:35:03.708 [INFO][3074] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Namespace="default" Pod="nginx-deployment-85f456d6dd-vwlfp" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f8ace1c2-8665-4a3e-8ec5-bf6f46643d01", ResourceVersion:"1441", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-vwlfp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie8700385ee2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:03.745277 env[1430]: 2024-12-13 14:35:03.708 [INFO][3074] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.44.66/32] ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Namespace="default" Pod="nginx-deployment-85f456d6dd-vwlfp" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.745277 env[1430]: 2024-12-13 14:35:03.708 [INFO][3074] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie8700385ee2 ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Namespace="default" Pod="nginx-deployment-85f456d6dd-vwlfp" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.745277 env[1430]: 2024-12-13 14:35:03.733 [INFO][3074] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Namespace="default" Pod="nginx-deployment-85f456d6dd-vwlfp" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.745277 env[1430]: 2024-12-13 14:35:03.734 [INFO][3074] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Namespace="default" Pod="nginx-deployment-85f456d6dd-vwlfp" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f8ace1c2-8665-4a3e-8ec5-bf6f46643d01", ResourceVersion:"1441", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee", Pod:"nginx-deployment-85f456d6dd-vwlfp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie8700385ee2", MAC:"5e:ab:0d:6a:67:fd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:03.745277 env[1430]: 2024-12-13 14:35:03.743 [INFO][3074] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee" Namespace="default" Pod="nginx-deployment-85f456d6dd-vwlfp" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:03.757000 audit[3106]: NETFILTER_CFG table=filter:74 family=2 entries=38 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:35:03.757000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffdd7b63e10 a2=0 a3=7ffdd7b63dfc items=0 ppid=2722 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.757000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:35:03.772342 env[1430]: time="2024-12-13T14:35:03.772105479Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:35:03.772342 env[1430]: time="2024-12-13T14:35:03.772162779Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:35:03.772342 env[1430]: time="2024-12-13T14:35:03.772177980Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:35:03.772570 env[1430]: time="2024-12-13T14:35:03.772372381Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee pid=3114 runtime=io.containerd.runc.v2 Dec 13 14:35:03.786463 systemd[1]: Started cri-containerd-fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee.scope. Dec 13 14:35:03.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit: BPF prog-id=108 op=LOAD Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000231c48 a2=10 a3=1c items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665636438366665643562303532303163333730346134656332303736 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002316b0 a2=3c a3=c items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665636438366665643562303532303163333730346134656332303736 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit: BPF prog-id=109 op=LOAD Dec 13 14:35:03.802000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002319d8 a2=78 a3=c0001d6ab0 items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665636438366665643562303532303163333730346134656332303736 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit: BPF prog-id=110 op=LOAD Dec 13 14:35:03.802000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000231770 a2=78 a3=c0001d6af8 items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665636438366665643562303532303163333730346134656332303736 Dec 13 14:35:03.802000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:35:03.802000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:03.802000 audit: BPF prog-id=111 op=LOAD Dec 13 14:35:03.802000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000231c30 a2=78 a3=c0001d6f08 items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665636438366665643562303532303163333730346134656332303736 Dec 13 14:35:03.832616 env[1430]: time="2024-12-13T14:35:03.832015731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-vwlfp,Uid:f8ace1c2-8665-4a3e-8ec5-bf6f46643d01,Namespace:default,Attempt:1,} returns sandbox id \"fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee\"" Dec 13 14:35:03.971502 systemd[1]: run-containerd-runc-k8s.io-52222ae2414a43d5ef62b6aa907b2aa15b51e64bbc23de64770f9939bcf59942-runc.xLb4EN.mount: Deactivated successfully. Dec 13 14:35:03.971639 systemd[1]: run-netns-cni\x2d56ef980d\x2dafa1\x2d0db4\x2d8c6a\x2d0a62571fed55.mount: Deactivated successfully. Dec 13 14:35:04.475371 kubelet[2015]: E1213 14:35:04.475312 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:04.798028 env[1430]: time="2024-12-13T14:35:04.797754994Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:04.804611 env[1430]: time="2024-12-13T14:35:04.804551445Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:04.809005 env[1430]: time="2024-12-13T14:35:04.808972177Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:04.813914 env[1430]: time="2024-12-13T14:35:04.813877214Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:04.814380 env[1430]: time="2024-12-13T14:35:04.814346117Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:35:04.816063 env[1430]: time="2024-12-13T14:35:04.816009629Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:35:04.817405 env[1430]: time="2024-12-13T14:35:04.817352039Z" level=info msg="CreateContainer within sandbox \"23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:35:04.853158 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1003703537.mount: Deactivated successfully. Dec 13 14:35:04.867770 env[1430]: time="2024-12-13T14:35:04.867718812Z" level=info msg="CreateContainer within sandbox \"23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"288b8ad00e0bfb9ae83b88edfeae29b9d8237ccc5bfb8b102cd155b1b42e721d\"" Dec 13 14:35:04.868337 env[1430]: time="2024-12-13T14:35:04.868304416Z" level=info msg="StartContainer for \"288b8ad00e0bfb9ae83b88edfeae29b9d8237ccc5bfb8b102cd155b1b42e721d\"" Dec 13 14:35:04.895792 systemd[1]: Started cri-containerd-288b8ad00e0bfb9ae83b88edfeae29b9d8237ccc5bfb8b102cd155b1b42e721d.scope. Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f082ed702f8 items=0 ppid=2980 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:04.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238386238616430306530626662396165383362383865646665616532 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit: BPF prog-id=112 op=LOAD Dec 13 14:35:04.910000 audit[3157]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0000248b8 items=0 ppid=2980 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:04.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238386238616430306530626662396165383362383865646665616532 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit: BPF prog-id=113 op=LOAD Dec 13 14:35:04.910000 audit[3157]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024908 items=0 ppid=2980 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:04.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238386238616430306530626662396165383362383865646665616532 Dec 13 14:35:04.910000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:35:04.910000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:04.910000 audit: BPF prog-id=114 op=LOAD Dec 13 14:35:04.910000 audit[3157]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000024998 items=0 ppid=2980 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:04.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238386238616430306530626662396165383362383865646665616532 Dec 13 14:35:04.926993 env[1430]: time="2024-12-13T14:35:04.926949049Z" level=info msg="StartContainer for \"288b8ad00e0bfb9ae83b88edfeae29b9d8237ccc5bfb8b102cd155b1b42e721d\" returns successfully" Dec 13 14:35:04.967517 systemd[1]: run-containerd-runc-k8s.io-288b8ad00e0bfb9ae83b88edfeae29b9d8237ccc5bfb8b102cd155b1b42e721d-runc.wswiHc.mount: Deactivated successfully. Dec 13 14:35:04.969248 systemd-networkd[1599]: calie8700385ee2: Gained IPv6LL Dec 13 14:35:05.475720 kubelet[2015]: E1213 14:35:05.475668 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:05.569869 kubelet[2015]: I1213 14:35:05.569830 2015 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:35:05.569869 kubelet[2015]: I1213 14:35:05.569867 2015 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:35:05.877475 kubelet[2015]: I1213 14:35:05.877418 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-2tkgs" podStartSLOduration=43.005278274 podStartE2EDuration="46.877397748s" podCreationTimestamp="2024-12-13 14:34:19 +0000 UTC" firstStartedPulling="2024-12-13 14:35:00.943423352 +0000 UTC m=+42.158908991" lastFinishedPulling="2024-12-13 14:35:04.815542826 +0000 UTC m=+46.031028465" observedRunningTime="2024-12-13 14:35:05.877129146 +0000 UTC m=+47.092614685" watchObservedRunningTime="2024-12-13 14:35:05.877397748 +0000 UTC m=+47.092883387" Dec 13 14:35:06.475863 kubelet[2015]: E1213 14:35:06.475808 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:07.476032 kubelet[2015]: E1213 14:35:07.475984 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:08.373176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount530109676.mount: Deactivated successfully. Dec 13 14:35:08.476965 kubelet[2015]: E1213 14:35:08.476889 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:09.477696 kubelet[2015]: E1213 14:35:09.477632 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:09.935938 env[1430]: time="2024-12-13T14:35:09.935882029Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:09.943456 env[1430]: time="2024-12-13T14:35:09.943407779Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:09.951326 env[1430]: time="2024-12-13T14:35:09.951281532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:09.956242 env[1430]: time="2024-12-13T14:35:09.956203065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:09.956902 env[1430]: time="2024-12-13T14:35:09.956869869Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:35:09.959650 env[1430]: time="2024-12-13T14:35:09.959620088Z" level=info msg="CreateContainer within sandbox \"fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:35:10.021527 env[1430]: time="2024-12-13T14:35:10.021469100Z" level=info msg="CreateContainer within sandbox \"fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"1351005a0bb052a2f6729a47514fc324e8b388f425ccb86d037c73ecb576eed0\"" Dec 13 14:35:10.022129 env[1430]: time="2024-12-13T14:35:10.022017204Z" level=info msg="StartContainer for \"1351005a0bb052a2f6729a47514fc324e8b388f425ccb86d037c73ecb576eed0\"" Dec 13 14:35:10.047563 systemd[1]: Started cri-containerd-1351005a0bb052a2f6729a47514fc324e8b388f425ccb86d037c73ecb576eed0.scope. Dec 13 14:35:10.063110 kernel: kauditd_printk_skb: 196 callbacks suppressed Dec 13 14:35:10.063214 kernel: audit: type=1400 audit(1734100510.056:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.090729 kernel: audit: type=1400 audit(1734100510.056:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104748 kernel: audit: type=1400 audit(1734100510.056:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.118957 kernel: audit: type=1400 audit(1734100510.056:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.147542 kernel: audit: type=1400 audit(1734100510.056:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.147662 kernel: audit: type=1400 audit(1734100510.056:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.148147 kernel: audit: type=1400 audit(1734100510.056:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.193631 kernel: audit: type=1400 audit(1734100510.056:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.193842 kernel: audit: type=1400 audit(1734100510.056:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit: BPF prog-id=115 op=LOAD Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3114 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353130303561306262303532613266363732396134373531346663 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3114 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.208138 kernel: audit: type=1400 audit(1734100510.062:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353130303561306262303532613266363732396134373531346663 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.062000 audit: BPF prog-id=116 op=LOAD Dec 13 14:35:10.062000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000b13a0 items=0 ppid=3114 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353130303561306262303532613266363732396134373531346663 Dec 13 14:35:10.076000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.076000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.076000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.076000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.076000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.076000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.076000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.076000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.076000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.076000 audit: BPF prog-id=117 op=LOAD Dec 13 14:35:10.076000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000b13e8 items=0 ppid=3114 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353130303561306262303532613266363732396134373531346663 Dec 13 14:35:10.104000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:35:10.104000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.104000 audit: BPF prog-id=118 op=LOAD Dec 13 14:35:10.104000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000b17f8 items=0 ppid=3114 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353130303561306262303532613266363732396134373531346663 Dec 13 14:35:10.209601 env[1430]: time="2024-12-13T14:35:10.209556539Z" level=info msg="StartContainer for \"1351005a0bb052a2f6729a47514fc324e8b388f425ccb86d037c73ecb576eed0\" returns successfully" Dec 13 14:35:10.478541 kubelet[2015]: E1213 14:35:10.478321 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:11.478796 kubelet[2015]: E1213 14:35:11.478739 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:12.479789 kubelet[2015]: E1213 14:35:12.479731 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:13.480129 kubelet[2015]: E1213 14:35:13.480017 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:14.481264 kubelet[2015]: E1213 14:35:14.481207 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:15.482097 kubelet[2015]: E1213 14:35:15.482032 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:16.483326 kubelet[2015]: E1213 14:35:16.483224 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:17.484261 kubelet[2015]: E1213 14:35:17.484211 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:18.484484 kubelet[2015]: E1213 14:35:18.484428 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:19.443102 kubelet[2015]: E1213 14:35:19.443033 2015 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:19.465321 env[1430]: time="2024-12-13T14:35:19.465257539Z" level=info msg="StopPodSandbox for \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\"" Dec 13 14:35:19.484628 kubelet[2015]: E1213 14:35:19.484589 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.509 [WARNING][3291] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--2tkgs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb477b23-5d83-4ff1-b5ba-e29abf5e379d", ResourceVersion:"1455", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c", Pod:"csi-node-driver-2tkgs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1ce6c126bee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.510 [INFO][3291] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.510 [INFO][3291] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" iface="eth0" netns="" Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.510 [INFO][3291] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.510 [INFO][3291] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.528 [INFO][3299] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" HandleID="k8s-pod-network.05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.528 [INFO][3299] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.528 [INFO][3299] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.541 [WARNING][3299] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" HandleID="k8s-pod-network.05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.541 [INFO][3299] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" HandleID="k8s-pod-network.05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.543 [INFO][3299] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:19.545863 env[1430]: 2024-12-13 14:35:19.544 [INFO][3291] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:19.546625 env[1430]: time="2024-12-13T14:35:19.545885893Z" level=info msg="TearDown network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\" successfully" Dec 13 14:35:19.546625 env[1430]: time="2024-12-13T14:35:19.545943793Z" level=info msg="StopPodSandbox for \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\" returns successfully" Dec 13 14:35:19.546625 env[1430]: time="2024-12-13T14:35:19.546533397Z" level=info msg="RemovePodSandbox for \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\"" Dec 13 14:35:19.546625 env[1430]: time="2024-12-13T14:35:19.546567697Z" level=info msg="Forcibly stopping sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\"" Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.583 [WARNING][3318] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--2tkgs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb477b23-5d83-4ff1-b5ba-e29abf5e379d", ResourceVersion:"1455", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"23d96c9466cfa8f6b1f14e33780567c0a12e113c3b6ad7ee503328d433bdfd8c", Pod:"csi-node-driver-2tkgs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1ce6c126bee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.583 [INFO][3318] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.583 [INFO][3318] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" iface="eth0" netns="" Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.583 [INFO][3318] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.583 [INFO][3318] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.612 [INFO][3324] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" HandleID="k8s-pod-network.05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.612 [INFO][3324] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.613 [INFO][3324] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.624 [WARNING][3324] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" HandleID="k8s-pod-network.05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.624 [INFO][3324] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" HandleID="k8s-pod-network.05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Workload="10.200.8.15-k8s-csi--node--driver--2tkgs-eth0" Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.625 [INFO][3324] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:19.628168 env[1430]: 2024-12-13 14:35:19.627 [INFO][3318] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea" Dec 13 14:35:19.629111 env[1430]: time="2024-12-13T14:35:19.628204657Z" level=info msg="TearDown network for sandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\" successfully" Dec 13 14:35:19.640696 env[1430]: time="2024-12-13T14:35:19.640649927Z" level=info msg="RemovePodSandbox \"05a1e357138f21a2aae54e131edb9482e0c4084363078bd86c473305839549ea\" returns successfully" Dec 13 14:35:19.641236 env[1430]: time="2024-12-13T14:35:19.641192030Z" level=info msg="StopPodSandbox for \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\"" Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.675 [WARNING][3342] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f8ace1c2-8665-4a3e-8ec5-bf6f46643d01", ResourceVersion:"1473", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee", Pod:"nginx-deployment-85f456d6dd-vwlfp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie8700385ee2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.675 [INFO][3342] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.675 [INFO][3342] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" iface="eth0" netns="" Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.675 [INFO][3342] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.675 [INFO][3342] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.697 [INFO][3348] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" HandleID="k8s-pod-network.1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.697 [INFO][3348] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.697 [INFO][3348] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.707 [WARNING][3348] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" HandleID="k8s-pod-network.1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.708 [INFO][3348] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" HandleID="k8s-pod-network.1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.712 [INFO][3348] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:19.714774 env[1430]: 2024-12-13 14:35:19.713 [INFO][3342] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:19.714774 env[1430]: time="2024-12-13T14:35:19.714608443Z" level=info msg="TearDown network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\" successfully" Dec 13 14:35:19.714774 env[1430]: time="2024-12-13T14:35:19.714645944Z" level=info msg="StopPodSandbox for \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\" returns successfully" Dec 13 14:35:19.716324 env[1430]: time="2024-12-13T14:35:19.716279953Z" level=info msg="RemovePodSandbox for \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\"" Dec 13 14:35:19.716455 env[1430]: time="2024-12-13T14:35:19.716322853Z" level=info msg="Forcibly stopping sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\"" Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.749 [WARNING][3366] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f8ace1c2-8665-4a3e-8ec5-bf6f46643d01", ResourceVersion:"1473", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"fecd86fed5b05201c3704a4ec2076bbfac0efc5f9ca4e6b1f78723bbf5a7e3ee", Pod:"nginx-deployment-85f456d6dd-vwlfp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie8700385ee2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.750 [INFO][3366] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.750 [INFO][3366] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" iface="eth0" netns="" Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.750 [INFO][3366] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.750 [INFO][3366] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.771 [INFO][3372] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" HandleID="k8s-pod-network.1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.771 [INFO][3372] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.771 [INFO][3372] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.778 [WARNING][3372] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" HandleID="k8s-pod-network.1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.778 [INFO][3372] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" HandleID="k8s-pod-network.1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Workload="10.200.8.15-k8s-nginx--deployment--85f456d6dd--vwlfp-eth0" Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.780 [INFO][3372] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:19.781805 env[1430]: 2024-12-13 14:35:19.780 [INFO][3366] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df" Dec 13 14:35:19.782599 env[1430]: time="2024-12-13T14:35:19.781842022Z" level=info msg="TearDown network for sandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\" successfully" Dec 13 14:35:19.793036 env[1430]: time="2024-12-13T14:35:19.792990885Z" level=info msg="RemovePodSandbox \"1302694640efdec2640615d11be8e8c0a27cf1a3103ec0807744fd791ece19df\" returns successfully" Dec 13 14:35:19.977000 audit[3379]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=3379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:19.984395 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:35:19.984500 kernel: audit: type=1325 audit(1734100519.977:717): table=filter:75 family=2 entries=20 op=nft_register_rule pid=3379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:19.977000 audit[3379]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff2f03b600 a2=0 a3=7fff2f03b5ec items=0 ppid=2161 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.019774 kernel: audit: type=1300 audit(1734100519.977:717): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff2f03b600 a2=0 a3=7fff2f03b5ec items=0 ppid=2161 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.019893 kernel: audit: type=1327 audit(1734100519.977:717): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:19.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:20.032000 audit[3379]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:20.032000 audit[3379]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff2f03b600 a2=0 a3=0 items=0 ppid=2161 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.045150 kernel: audit: type=1325 audit(1734100520.032:718): table=nat:76 family=2 entries=22 op=nft_register_rule pid=3379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:20.045193 kernel: audit: type=1300 audit(1734100520.032:718): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff2f03b600 a2=0 a3=0 items=0 ppid=2161 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.061681 kubelet[2015]: I1213 14:35:20.060958 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-vwlfp" podStartSLOduration=25.93586215 podStartE2EDuration="32.060941789s" podCreationTimestamp="2024-12-13 14:34:48 +0000 UTC" firstStartedPulling="2024-12-13 14:35:03.83322254 +0000 UTC m=+45.048708079" lastFinishedPulling="2024-12-13 14:35:09.958302179 +0000 UTC m=+51.173787718" observedRunningTime="2024-12-13 14:35:10.887101601 +0000 UTC m=+52.102587240" watchObservedRunningTime="2024-12-13 14:35:20.060941789 +0000 UTC m=+61.276427328" Dec 13 14:35:20.061681 kubelet[2015]: I1213 14:35:20.061163 2015 topology_manager.go:215] "Topology Admit Handler" podUID="31d0e9e8-0837-4eea-a6d7-ceda57b839b3" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:35:20.073466 kernel: audit: type=1327 audit(1734100520.032:718): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:20.032000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:20.067771 systemd[1]: Created slice kubepods-besteffort-pod31d0e9e8_0837_4eea_a6d7_ceda57b839b3.slice. Dec 13 14:35:20.072000 audit[3383]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=3383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:20.089516 kernel: audit: type=1325 audit(1734100520.072:719): table=filter:77 family=2 entries=32 op=nft_register_rule pid=3383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:20.089594 kernel: audit: type=1300 audit(1734100520.072:719): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffde4242800 a2=0 a3=7ffde42427ec items=0 ppid=2161 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.072000 audit[3383]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffde4242800 a2=0 a3=7ffde42427ec items=0 ppid=2161 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:20.120755 kernel: audit: type=1327 audit(1734100520.072:719): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:20.120860 kernel: audit: type=1325 audit(1734100520.109:720): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:20.109000 audit[3383]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:20.109000 audit[3383]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffde4242800 a2=0 a3=0 items=0 ppid=2161 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:20.245899 kubelet[2015]: I1213 14:35:20.245744 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/31d0e9e8-0837-4eea-a6d7-ceda57b839b3-data\") pod \"nfs-server-provisioner-0\" (UID: \"31d0e9e8-0837-4eea-a6d7-ceda57b839b3\") " pod="default/nfs-server-provisioner-0" Dec 13 14:35:20.245899 kubelet[2015]: I1213 14:35:20.245807 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2m6qh\" (UniqueName: \"kubernetes.io/projected/31d0e9e8-0837-4eea-a6d7-ceda57b839b3-kube-api-access-2m6qh\") pod \"nfs-server-provisioner-0\" (UID: \"31d0e9e8-0837-4eea-a6d7-ceda57b839b3\") " pod="default/nfs-server-provisioner-0" Dec 13 14:35:20.374867 env[1430]: time="2024-12-13T14:35:20.374818428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:31d0e9e8-0837-4eea-a6d7-ceda57b839b3,Namespace:default,Attempt:0,}" Dec 13 14:35:20.485574 kubelet[2015]: E1213 14:35:20.485526 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:20.515797 systemd-networkd[1599]: cali60e51b789ff: Link UP Dec 13 14:35:20.523325 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:35:20.529889 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:35:20.530465 systemd-networkd[1599]: cali60e51b789ff: Gained carrier Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.449 [INFO][3386] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 31d0e9e8-0837-4eea-a6d7-ceda57b839b3 1512 0 2024-12-13 14:35:20 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.15 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.450 [INFO][3386] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.474 [INFO][3398] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" HandleID="k8s-pod-network.b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Workload="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.483 [INFO][3398] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" HandleID="k8s-pod-network.b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Workload="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042a690), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.15", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:35:20.474521481 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.483 [INFO][3398] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.483 [INFO][3398] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.483 [INFO][3398] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.485 [INFO][3398] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" host="10.200.8.15" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.488 [INFO][3398] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.491 [INFO][3398] ipam/ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.493 [INFO][3398] ipam/ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.495 [INFO][3398] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.495 [INFO][3398] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" host="10.200.8.15" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.496 [INFO][3398] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921 Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.500 [INFO][3398] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" host="10.200.8.15" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.511 [INFO][3398] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.44.67/26] block=192.168.44.64/26 handle="k8s-pod-network.b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" host="10.200.8.15" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.511 [INFO][3398] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.67/26] handle="k8s-pod-network.b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" host="10.200.8.15" Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.511 [INFO][3398] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:20.541632 env[1430]: 2024-12-13 14:35:20.511 [INFO][3398] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.44.67/26] IPv6=[] ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" HandleID="k8s-pod-network.b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Workload="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:20.542858 env[1430]: 2024-12-13 14:35:20.512 [INFO][3386] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"31d0e9e8-0837-4eea-a6d7-ceda57b839b3", ResourceVersion:"1512", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 35, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.44.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:20.542858 env[1430]: 2024-12-13 14:35:20.513 [INFO][3386] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.44.67/32] ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:20.542858 env[1430]: 2024-12-13 14:35:20.513 [INFO][3386] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:20.542858 env[1430]: 2024-12-13 14:35:20.531 [INFO][3386] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:20.543382 env[1430]: 2024-12-13 14:35:20.531 [INFO][3386] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"31d0e9e8-0837-4eea-a6d7-ceda57b839b3", ResourceVersion:"1512", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 35, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.44.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1e:16:ae:79:79:fd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:20.543382 env[1430]: 2024-12-13 14:35:20.540 [INFO][3386] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:20.559000 audit[3420]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=3420 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:35:20.559000 audit[3420]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff4f98beb0 a2=0 a3=7fff4f98be9c items=0 ppid=2722 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.559000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:35:20.566147 env[1430]: time="2024-12-13T14:35:20.566066288Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:35:20.566328 env[1430]: time="2024-12-13T14:35:20.566127989Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:35:20.566328 env[1430]: time="2024-12-13T14:35:20.566142989Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:35:20.566328 env[1430]: time="2024-12-13T14:35:20.566275689Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921 pid=3429 runtime=io.containerd.runc.v2 Dec 13 14:35:20.584109 systemd[1]: Started cri-containerd-b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921.scope. Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.602000 audit: BPF prog-id=119 op=LOAD Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3429 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239643133383732613835393363383864613037343234666436363931 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3429 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239643133383732613835393363383864613037343234666436363931 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit: BPF prog-id=120 op=LOAD Dec 13 14:35:20.603000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000321a50 items=0 ppid=3429 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239643133383732613835393363383864613037343234666436363931 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit: BPF prog-id=121 op=LOAD Dec 13 14:35:20.603000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000321a98 items=0 ppid=3429 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239643133383732613835393363383864613037343234666436363931 Dec 13 14:35:20.603000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:35:20.603000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:20.603000 audit: BPF prog-id=122 op=LOAD Dec 13 14:35:20.603000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000321ea8 items=0 ppid=3429 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:20.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239643133383732613835393363383864613037343234666436363931 Dec 13 14:35:20.631484 env[1430]: time="2024-12-13T14:35:20.631433951Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:31d0e9e8-0837-4eea-a6d7-ceda57b839b3,Namespace:default,Attempt:0,} returns sandbox id \"b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921\"" Dec 13 14:35:20.633548 env[1430]: time="2024-12-13T14:35:20.633509662Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:35:21.486403 kubelet[2015]: E1213 14:35:21.486368 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:22.249480 systemd-networkd[1599]: cali60e51b789ff: Gained IPv6LL Dec 13 14:35:22.487455 kubelet[2015]: E1213 14:35:22.487397 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:23.487943 kubelet[2015]: E1213 14:35:23.487908 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:24.488297 kubelet[2015]: E1213 14:35:24.488251 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:25.489366 kubelet[2015]: E1213 14:35:25.489329 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:26.374260 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3881545058.mount: Deactivated successfully. Dec 13 14:35:26.489956 kubelet[2015]: E1213 14:35:26.489892 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:27.490035 kubelet[2015]: E1213 14:35:27.489993 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:28.483491 env[1430]: time="2024-12-13T14:35:28.483439770Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:28.490724 kubelet[2015]: E1213 14:35:28.490663 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:28.492325 env[1430]: time="2024-12-13T14:35:28.492264714Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:28.498835 env[1430]: time="2024-12-13T14:35:28.498793146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:28.503742 env[1430]: time="2024-12-13T14:35:28.503700470Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:28.504426 env[1430]: time="2024-12-13T14:35:28.504392873Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:35:28.507230 env[1430]: time="2024-12-13T14:35:28.507197787Z" level=info msg="CreateContainer within sandbox \"b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:35:28.546322 env[1430]: time="2024-12-13T14:35:28.546235279Z" level=info msg="CreateContainer within sandbox \"b9d13872a8593c88da07424fd66912a96ed3f079b10c609fdf7e189d7841c921\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"84837f9b3c3354c7dae5edab13ffd54500b2972c0173ef3fb685662499c1e823\"" Dec 13 14:35:28.547157 env[1430]: time="2024-12-13T14:35:28.547092783Z" level=info msg="StartContainer for \"84837f9b3c3354c7dae5edab13ffd54500b2972c0173ef3fb685662499c1e823\"" Dec 13 14:35:28.566697 systemd[1]: Started cri-containerd-84837f9b3c3354c7dae5edab13ffd54500b2972c0173ef3fb685662499c1e823.scope. Dec 13 14:35:28.604427 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:35:28.604561 kernel: audit: type=1400 audit(1734100528.584:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.604602 kernel: audit: type=1400 audit(1734100528.584:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.632566 kernel: audit: type=1400 audit(1734100528.584:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.632689 kernel: audit: type=1400 audit(1734100528.584:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.675475 kernel: audit: type=1400 audit(1734100528.584:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.675570 kernel: audit: type=1400 audit(1734100528.584:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.675594 kernel: audit: type=1400 audit(1734100528.584:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.705476 kernel: audit: type=1400 audit(1734100528.584:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.705708 kernel: audit: type=1400 audit(1734100528.584:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.736865 kernel: audit: type=1400 audit(1734100528.618:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.618000 audit: BPF prog-id=123 op=LOAD Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3429 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:28.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383337663962336333333534633764616535656461623133666664 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=3429 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:28.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383337663962336333333534633764616535656461623133666664 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.628000 audit: BPF prog-id=124 op=LOAD Dec 13 14:35:28.628000 audit[3473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000024450 items=0 ppid=3429 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:28.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383337663962336333333534633764616535656461623133666664 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit: BPF prog-id=125 op=LOAD Dec 13 14:35:28.646000 audit[3473]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000024498 items=0 ppid=3429 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:28.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383337663962336333333534633764616535656461623133666664 Dec 13 14:35:28.646000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:35:28.646000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { perfmon } for pid=3473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit[3473]: AVC avc: denied { bpf } for pid=3473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:28.646000 audit: BPF prog-id=126 op=LOAD Dec 13 14:35:28.646000 audit[3473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0000248a8 items=0 ppid=3429 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:28.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383337663962336333333534633764616535656461623133666664 Dec 13 14:35:28.760221 env[1430]: time="2024-12-13T14:35:28.760138930Z" level=info msg="StartContainer for \"84837f9b3c3354c7dae5edab13ffd54500b2972c0173ef3fb685662499c1e823\" returns successfully" Dec 13 14:35:28.799000 audit[3503]: AVC avc: denied { search } for pid=3503 comm="rpcbind" name="crypto" dev="proc" ino=27660 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:35:28.799000 audit[3503]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f66711710c0 a2=0 a3=0 items=0 ppid=3484 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 key=(null) Dec 13 14:35:28.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:35:28.836000 audit[3508]: AVC avc: denied { search } for pid=3508 comm="dbus-daemon" name="crypto" dev="proc" ino=27660 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:35:28.836000 audit[3508]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4b86d2c0c0 a2=0 a3=0 items=0 ppid=3484 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 key=(null) Dec 13 14:35:28.836000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:35:28.839000 audit[3509]: AVC avc: denied { watch } for pid=3509 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538695 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c205,c784 tclass=dir permissive=0 Dec 13 14:35:28.839000 audit[3509]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56129e38e040 a2=2c8 a3=7ffd5cc78a1c items=0 ppid=3484 pid=3509 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 key=(null) Dec 13 14:35:28.839000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:35:28.844000 audit[3510]: AVC avc: denied { read } for pid=3510 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=27742 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:35:28.844000 audit[3510]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f01aa1f2320 a1=80000 a2=d a3=7fff5c2d7aa0 items=0 ppid=3484 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 key=(null) Dec 13 14:35:28.844000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:35:28.847000 audit[3510]: AVC avc: denied { search } for pid=3510 comm="ganesha.nfsd" name="crypto" dev="proc" ino=27660 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:35:28.847000 audit[3510]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f01a97460c0 a2=0 a3=0 items=0 ppid=3484 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c784 key=(null) Dec 13 14:35:28.847000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:35:28.950000 audit[3515]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:28.950000 audit[3515]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc290dda70 a2=0 a3=7ffc290dda5c items=0 ppid=2161 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:28.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:28.956000 audit[3515]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=3515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:28.956000 audit[3515]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc290dda70 a2=0 a3=7ffc290dda5c items=0 ppid=2161 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:28.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:29.490881 kubelet[2015]: E1213 14:35:29.490827 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:30.491399 kubelet[2015]: E1213 14:35:30.491342 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:31.492168 kubelet[2015]: E1213 14:35:31.492133 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:32.492358 kubelet[2015]: E1213 14:35:32.492295 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:33.492617 kubelet[2015]: E1213 14:35:33.492585 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:34.493719 kubelet[2015]: E1213 14:35:34.493678 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:35.494187 kubelet[2015]: E1213 14:35:35.494148 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:36.494339 kubelet[2015]: E1213 14:35:36.494274 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:37.495223 kubelet[2015]: E1213 14:35:37.495190 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:38.496144 kubelet[2015]: E1213 14:35:38.496092 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:39.443039 kubelet[2015]: E1213 14:35:39.442983 2015 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:39.496479 kubelet[2015]: E1213 14:35:39.496445 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:40.497281 kubelet[2015]: E1213 14:35:40.497229 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:41.497511 kubelet[2015]: E1213 14:35:41.497475 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:42.498411 kubelet[2015]: E1213 14:35:42.498369 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:43.498802 kubelet[2015]: E1213 14:35:43.498764 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:44.498997 kubelet[2015]: E1213 14:35:44.498940 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:45.499476 kubelet[2015]: E1213 14:35:45.499441 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:46.500161 kubelet[2015]: E1213 14:35:46.500115 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:47.501214 kubelet[2015]: E1213 14:35:47.501155 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:48.501542 kubelet[2015]: E1213 14:35:48.501441 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:49.502000 kubelet[2015]: E1213 14:35:49.501959 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:50.502551 kubelet[2015]: E1213 14:35:50.502491 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:51.503288 kubelet[2015]: E1213 14:35:51.503234 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:52.504182 kubelet[2015]: E1213 14:35:52.504128 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:53.504846 kubelet[2015]: E1213 14:35:53.504800 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:53.673909 kubelet[2015]: I1213 14:35:53.673832 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=25.801068902 podStartE2EDuration="33.673769123s" podCreationTimestamp="2024-12-13 14:35:20 +0000 UTC" firstStartedPulling="2024-12-13 14:35:20.632990359 +0000 UTC m=+61.848475898" lastFinishedPulling="2024-12-13 14:35:28.50569058 +0000 UTC m=+69.721176119" observedRunningTime="2024-12-13 14:35:28.939272611 +0000 UTC m=+70.154758150" watchObservedRunningTime="2024-12-13 14:35:53.673769123 +0000 UTC m=+94.889254662" Dec 13 14:35:53.674252 kubelet[2015]: I1213 14:35:53.674015 2015 topology_manager.go:215] "Topology Admit Handler" podUID="0aaa2396-c1f0-4172-bb97-fa88c4ea14a4" podNamespace="default" podName="test-pod-1" Dec 13 14:35:53.679731 systemd[1]: Created slice kubepods-besteffort-pod0aaa2396_c1f0_4172_bb97_fa88c4ea14a4.slice. Dec 13 14:35:53.830883 kubelet[2015]: I1213 14:35:53.830471 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cqqzg\" (UniqueName: \"kubernetes.io/projected/0aaa2396-c1f0-4172-bb97-fa88c4ea14a4-kube-api-access-cqqzg\") pod \"test-pod-1\" (UID: \"0aaa2396-c1f0-4172-bb97-fa88c4ea14a4\") " pod="default/test-pod-1" Dec 13 14:35:53.830883 kubelet[2015]: I1213 14:35:53.830532 2015 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-91a09131-4387-45dc-8afb-c31c6530bad4\" (UniqueName: \"kubernetes.io/nfs/0aaa2396-c1f0-4172-bb97-fa88c4ea14a4-pvc-91a09131-4387-45dc-8afb-c31c6530bad4\") pod \"test-pod-1\" (UID: \"0aaa2396-c1f0-4172-bb97-fa88c4ea14a4\") " pod="default/test-pod-1" Dec 13 14:35:53.963000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:53.992202 kernel: Failed to create system directory netfs Dec 13 14:35:53.992323 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:35:53.992345 kernel: audit: type=1400 audit(1734100553.963:765): avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:53.992372 kernel: Failed to create system directory netfs Dec 13 14:35:53.992390 kernel: audit: type=1400 audit(1734100553.963:765): avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:53.963000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.017556 kernel: Failed to create system directory netfs Dec 13 14:35:54.017663 kernel: audit: type=1400 audit(1734100553.963:765): avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:53.963000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.038525 kernel: Failed to create system directory netfs Dec 13 14:35:54.038645 kernel: audit: type=1400 audit(1734100553.963:765): avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:53.963000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:53.963000 audit[3565]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56064e7b65e0 a1=153bc a2=5606454c92b0 a3=5 items=0 ppid=1596 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:54.086457 kernel: audit: type=1300 audit(1734100553.963:765): arch=c000003e syscall=175 success=yes exit=0 a0=56064e7b65e0 a1=153bc a2=5606454c92b0 a3=5 items=0 ppid=1596 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:54.086582 kernel: Failed to create system directory fscache Dec 13 14:35:54.086607 kernel: audit: type=1327 audit(1734100553.963:765): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:53.963000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:54.098358 kernel: Failed to create system directory fscache Dec 13 14:35:54.098441 kernel: audit: type=1400 audit(1734100554.067:766): avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.118599 kernel: Failed to create system directory fscache Dec 13 14:35:54.118696 kernel: audit: type=1400 audit(1734100554.067:766): avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.139544 kernel: Failed to create system directory fscache Dec 13 14:35:54.139619 kernel: audit: type=1400 audit(1734100554.067:766): avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.160307 kernel: Failed to create system directory fscache Dec 13 14:35:54.160413 kernel: audit: type=1400 audit(1734100554.067:766): avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.177365 kernel: Failed to create system directory fscache Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.185512 kernel: Failed to create system directory fscache Dec 13 14:35:54.185592 kernel: Failed to create system directory fscache Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.192908 kernel: Failed to create system directory fscache Dec 13 14:35:54.192963 kernel: Failed to create system directory fscache Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.200290 kernel: Failed to create system directory fscache Dec 13 14:35:54.200362 kernel: Failed to create system directory fscache Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.207885 kernel: Failed to create system directory fscache Dec 13 14:35:54.067000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.211443 kernel: Failed to create system directory fscache Dec 13 14:35:54.215282 kernel: FS-Cache: Loaded Dec 13 14:35:54.067000 audit[3565]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56064e9cb9c0 a1=4c0fc a2=5606454c92b0 a3=5 items=0 ppid=1596 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:54.067000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.263979 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.264067 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.264111 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.270905 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.270973 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.277780 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.277853 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.281100 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.287536 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.287605 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.294801 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.294870 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.301339 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.301406 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.307624 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.308254 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.314053 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.314128 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.320442 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.323637 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.326816 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.326873 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.332885 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.332943 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.338812 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.338876 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.344625 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.344684 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.350476 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.350531 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.354094 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.359231 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.359285 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.364945 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.364997 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.370517 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.370570 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.377827 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.377888 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.385203 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.385271 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.391897 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.391969 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.398636 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.398695 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.405042 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.405120 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.411461 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.412286 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.415390 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.419111 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.425437 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.425525 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.428496 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.434113 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.434851 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.440705 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.440748 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.447531 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.447597 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.453751 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.453823 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.459404 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.459457 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.464764 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.464818 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.470827 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.470886 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.478652 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.478707 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.485228 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.485275 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.490836 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.490890 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.496377 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.496419 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.501878 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.501927 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.505204 kubelet[2015]: E1213 14:35:54.505151 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:54.507866 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.507920 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.510581 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.513358 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.516130 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.518903 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.522213 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.525125 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.530136 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.530182 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.535582 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.535627 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.541153 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.541199 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.546581 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.546626 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.551867 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.551912 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.557374 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.557421 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.562930 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.562994 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.568313 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.568374 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.573202 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.573261 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.578788 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.578853 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.584119 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.584171 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.589645 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.589709 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.595254 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.595307 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.600960 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.601019 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.606432 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.606492 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.611984 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.612047 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.617486 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.617552 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.623674 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.623737 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.627101 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.630125 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.634688 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.634749 kernel: Failed to create system directory sunrpc Dec 13 14:35:54.242000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.650812 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:35:54.650935 kernel: RPC: Registered udp transport module. Dec 13 14:35:54.650965 kernel: RPC: Registered tcp transport module. Dec 13 14:35:54.653237 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:35:54.242000 audit[3565]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56064ea17ad0 a1=1a7f1c a2=5606454c92b0 a3=5 items=6 ppid=1596 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:54.242000 audit: CWD cwd="/" Dec 13 14:35:54.242000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:54.242000 audit: PATH item=1 name=(null) inode=28003 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:54.242000 audit: PATH item=2 name=(null) inode=28003 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:54.242000 audit: PATH item=3 name=(null) inode=28004 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:54.242000 audit: PATH item=4 name=(null) inode=28003 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:54.242000 audit: PATH item=5 name=(null) inode=28005 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:54.242000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.711178 kernel: Failed to create system directory nfs Dec 13 14:35:54.711260 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.717208 kernel: Failed to create system directory nfs Dec 13 14:35:54.717260 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.722753 kernel: Failed to create system directory nfs Dec 13 14:35:54.722809 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.728093 kernel: Failed to create system directory nfs Dec 13 14:35:54.728176 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.734479 kernel: Failed to create system directory nfs Dec 13 14:35:54.734563 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.742973 kernel: Failed to create system directory nfs Dec 13 14:35:54.743375 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.748612 kernel: Failed to create system directory nfs Dec 13 14:35:54.748655 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.754893 kernel: Failed to create system directory nfs Dec 13 14:35:54.754938 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.759103 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.765765 kernel: Failed to create system directory nfs Dec 13 14:35:54.765832 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.770148 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.776472 kernel: Failed to create system directory nfs Dec 13 14:35:54.776535 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.782862 kernel: Failed to create system directory nfs Dec 13 14:35:54.782933 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.791299 kernel: Failed to create system directory nfs Dec 13 14:35:54.791831 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.795871 kernel: Failed to create system directory nfs Dec 13 14:35:54.795936 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.802019 kernel: Failed to create system directory nfs Dec 13 14:35:54.802100 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.805149 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.811825 kernel: Failed to create system directory nfs Dec 13 14:35:54.811875 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.818741 kernel: Failed to create system directory nfs Dec 13 14:35:54.818792 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.825238 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.826846 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.829152 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.835013 kernel: Failed to create system directory nfs Dec 13 14:35:54.835064 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.838266 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.846197 kernel: Failed to create system directory nfs Dec 13 14:35:54.846257 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.853645 kernel: Failed to create system directory nfs Dec 13 14:35:54.854885 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.861261 kernel: Failed to create system directory nfs Dec 13 14:35:54.861313 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.873011 kernel: Failed to create system directory nfs Dec 13 14:35:54.873093 kernel: Failed to create system directory nfs Dec 13 14:35:54.873122 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.879296 kernel: Failed to create system directory nfs Dec 13 14:35:54.879355 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.885632 kernel: Failed to create system directory nfs Dec 13 14:35:54.885688 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.893069 kernel: Failed to create system directory nfs Dec 13 14:35:54.893144 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.898629 kernel: Failed to create system directory nfs Dec 13 14:35:54.898697 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.905642 kernel: Failed to create system directory nfs Dec 13 14:35:54.905696 kernel: Failed to create system directory nfs Dec 13 14:35:54.697000 audit[3565]: AVC avc: denied { confidentiality } for pid=3565 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.931107 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:35:54.697000 audit[3565]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56064ec38700 a1=16e97c a2=5606454c92b0 a3=5 items=0 ppid=1596 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:54.697000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.980463 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.980592 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.982107 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.986949 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.987157 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.990100 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.994907 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.994957 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.002448 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.002534 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.009517 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.009568 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.017244 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.018024 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.023252 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.023330 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.029366 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.029425 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.032300 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.034981 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.037694 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.040243 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.042949 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.048503 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.055026 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.055069 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.061474 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.061529 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.068105 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.068175 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.074734 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.074791 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.081435 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.081528 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.084654 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.088159 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.094001 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.094675 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.102149 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.102205 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.108435 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.108493 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.114320 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.114373 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.120904 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.120957 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.127770 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.128592 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.130576 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.134005 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.137466 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.143511 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.151879 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.151958 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.151992 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.158068 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.158148 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.165191 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.165236 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.172995 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.173745 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.178704 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.178757 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.182071 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.188445 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.188509 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.194690 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.194831 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.198132 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.210135 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.210204 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.210230 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.216583 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.217295 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.222699 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.222778 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.226021 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.229272 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.232468 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.235342 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.238567 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.241145 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.243773 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.246838 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.249947 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.254150 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.257146 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.263460 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.263512 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.269901 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.269960 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.273115 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.277271 kernel: Failed to create system directory nfs4 Dec 13 14:35:54.958000 audit[3570]: AVC avc: denied { confidentiality } for pid=3570 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.284261 kernel: Failed to create system directory nfs4 Dec 13 14:35:55.419250 kernel: NFS: Registering the id_resolver key type Dec 13 14:35:55.419410 kernel: Key type id_resolver registered Dec 13 14:35:55.419435 kernel: Key type id_legacy registered Dec 13 14:35:54.958000 audit[3570]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb7dab03010 a1=208de4 a2=556414b0d2b0 a3=5 items=0 ppid=1596 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:54.958000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.446114 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.446184 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.446208 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.451694 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.451746 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.457568 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.457624 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.463300 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.463343 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.469037 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.469126 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.474699 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.474755 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.477630 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.488743 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.488806 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.493891 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.494738 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.500446 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.500514 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.505649 kubelet[2015]: E1213 14:35:55.505596 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:55.507754 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.507819 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.514309 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.515156 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.519145 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: AVC avc: denied { confidentiality } for pid=3571 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:55.525161 kernel: Failed to create system directory rpcgss Dec 13 14:35:55.435000 audit[3571]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f3537a47010 a1=70af4 a2=55c3722852b0 a3=5 items=0 ppid=1596 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:55.435000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:35:55.729821 nfsidmap[3578]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-da29b84149' Dec 13 14:35:55.796722 nfsidmap[3579]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-da29b84149' Dec 13 14:35:55.809000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:55.809000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:55.809000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:55.809000 audit[1552]: AVC avc: denied { watch_reads } for pid=1552 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:55.809000 audit[1552]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b32fee7b40 a2=10 a3=8cd265fd13947c75 items=0 ppid=1 pid=1552 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:55.809000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:35:55.810000 audit[1552]: AVC avc: denied { watch_reads } for pid=1552 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:55.810000 audit[1552]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b32fee7b40 a2=10 a3=8cd265fd13947c75 items=0 ppid=1 pid=1552 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:55.810000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:35:55.810000 audit[1552]: AVC avc: denied { watch_reads } for pid=1552 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:55.810000 audit[1552]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b32fee7b40 a2=10 a3=8cd265fd13947c75 items=0 ppid=1 pid=1552 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:55.810000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:35:56.083656 env[1430]: time="2024-12-13T14:35:56.082945109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0aaa2396-c1f0-4172-bb97-fa88c4ea14a4,Namespace:default,Attempt:0,}" Dec 13 14:35:56.237026 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:35:56.237167 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:35:56.227829 systemd-networkd[1599]: cali5ec59c6bf6e: Link UP Dec 13 14:35:56.238144 systemd-networkd[1599]: cali5ec59c6bf6e: Gained carrier Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.156 [INFO][3580] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-test--pod--1-eth0 default 0aaa2396-c1f0-4172-bb97-fa88c4ea14a4 1615 0 2024-12-13 14:35:21 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.15 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.156 [INFO][3580] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.181 [INFO][3592] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" HandleID="k8s-pod-network.8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Workload="10.200.8.15-k8s-test--pod--1-eth0" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.191 [INFO][3592] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" HandleID="k8s-pod-network.8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Workload="10.200.8.15-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292b70), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.15", "pod":"test-pod-1", "timestamp":"2024-12-13 14:35:56.181171466 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.191 [INFO][3592] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.191 [INFO][3592] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.191 [INFO][3592] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.193 [INFO][3592] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" host="10.200.8.15" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.196 [INFO][3592] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.201 [INFO][3592] ipam/ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.203 [INFO][3592] ipam/ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.205 [INFO][3592] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.206 [INFO][3592] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" host="10.200.8.15" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.207 [INFO][3592] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536 Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.211 [INFO][3592] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" host="10.200.8.15" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.220 [INFO][3592] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.44.68/26] block=192.168.44.64/26 handle="k8s-pod-network.8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" host="10.200.8.15" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.221 [INFO][3592] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.68/26] handle="k8s-pod-network.8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" host="10.200.8.15" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.221 [INFO][3592] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.221 [INFO][3592] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.44.68/26] IPv6=[] ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" HandleID="k8s-pod-network.8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Workload="10.200.8.15-k8s-test--pod--1-eth0" Dec 13 14:35:56.252397 env[1430]: 2024-12-13 14:35:56.222 [INFO][3580] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0aaa2396-c1f0-4172-bb97-fa88c4ea14a4", ResourceVersion:"1615", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 35, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:56.253616 env[1430]: 2024-12-13 14:35:56.222 [INFO][3580] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.44.68/32] ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Dec 13 14:35:56.253616 env[1430]: 2024-12-13 14:35:56.222 [INFO][3580] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Dec 13 14:35:56.253616 env[1430]: 2024-12-13 14:35:56.238 [INFO][3580] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Dec 13 14:35:56.253616 env[1430]: 2024-12-13 14:35:56.238 [INFO][3580] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0aaa2396-c1f0-4172-bb97-fa88c4ea14a4", ResourceVersion:"1615", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 35, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"6e:85:34:01:5c:22", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:56.253616 env[1430]: 2024-12-13 14:35:56.247 [INFO][3580] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Dec 13 14:35:56.261000 audit[3612]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3612 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:35:56.261000 audit[3612]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffd00bca030 a2=0 a3=7ffd00bca01c items=0 ppid=2722 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.261000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:35:56.285222 env[1430]: time="2024-12-13T14:35:56.285143845Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:35:56.285222 env[1430]: time="2024-12-13T14:35:56.285182445Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:35:56.285222 env[1430]: time="2024-12-13T14:35:56.285196045Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:35:56.285650 env[1430]: time="2024-12-13T14:35:56.285598646Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536 pid=3620 runtime=io.containerd.runc.v2 Dec 13 14:35:56.300696 systemd[1]: Started cri-containerd-8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536.scope. Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.320000 audit: BPF prog-id=127 op=LOAD Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3620 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363866323732396230613134386536613234316163633766333931 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3620 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363866323732396230613134386536613234316163633766333931 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit: BPF prog-id=128 op=LOAD Dec 13 14:35:56.321000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000210370 items=0 ppid=3620 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363866323732396230613134386536613234316163633766333931 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit: BPF prog-id=129 op=LOAD Dec 13 14:35:56.321000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002103b8 items=0 ppid=3620 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363866323732396230613134386536613234316163633766333931 Dec 13 14:35:56.321000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:35:56.321000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.321000 audit: BPF prog-id=130 op=LOAD Dec 13 14:35:56.321000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002107c8 items=0 ppid=3620 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363866323732396230613134386536613234316163633766333931 Dec 13 14:35:56.352800 env[1430]: time="2024-12-13T14:35:56.352759691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0aaa2396-c1f0-4172-bb97-fa88c4ea14a4,Namespace:default,Attempt:0,} returns sandbox id \"8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536\"" Dec 13 14:35:56.355701 env[1430]: time="2024-12-13T14:35:56.355671101Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:35:56.506718 kubelet[2015]: E1213 14:35:56.506647 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:56.698001 env[1430]: time="2024-12-13T14:35:56.697571546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:56.704471 env[1430]: time="2024-12-13T14:35:56.704431471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:56.709447 env[1430]: time="2024-12-13T14:35:56.709406489Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:56.714561 env[1430]: time="2024-12-13T14:35:56.714524808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:56.715260 env[1430]: time="2024-12-13T14:35:56.715226610Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:35:56.720012 env[1430]: time="2024-12-13T14:35:56.719972327Z" level=info msg="CreateContainer within sandbox \"8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:35:56.766225 env[1430]: time="2024-12-13T14:35:56.766176996Z" level=info msg="CreateContainer within sandbox \"8968f2729b0a148e6a241acc7f391b8a02c07bdd1a37b50e8a420d83f20c1536\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9d9e40efffe20abd2a35182bdc8bad85258447fc840471306570da81e279093a\"" Dec 13 14:35:56.766949 env[1430]: time="2024-12-13T14:35:56.766900798Z" level=info msg="StartContainer for \"9d9e40efffe20abd2a35182bdc8bad85258447fc840471306570da81e279093a\"" Dec 13 14:35:56.783773 systemd[1]: Started cri-containerd-9d9e40efffe20abd2a35182bdc8bad85258447fc840471306570da81e279093a.scope. Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.797000 audit: BPF prog-id=131 op=LOAD Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3620 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964396534306566666665323061626432613335313832626463386261 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3620 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964396534306566666665323061626432613335313832626463386261 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit: BPF prog-id=132 op=LOAD Dec 13 14:35:56.798000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e7770 items=0 ppid=3620 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964396534306566666665323061626432613335313832626463386261 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit: BPF prog-id=133 op=LOAD Dec 13 14:35:56.798000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e77b8 items=0 ppid=3620 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964396534306566666665323061626432613335313832626463386261 Dec 13 14:35:56.798000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:35:56.798000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:56.798000 audit: BPF prog-id=134 op=LOAD Dec 13 14:35:56.798000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001e7bc8 items=0 ppid=3620 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:56.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964396534306566666665323061626432613335313832626463386261 Dec 13 14:35:56.822567 env[1430]: time="2024-12-13T14:35:56.822523101Z" level=info msg="StartContainer for \"9d9e40efffe20abd2a35182bdc8bad85258447fc840471306570da81e279093a\" returns successfully" Dec 13 14:35:56.993466 kubelet[2015]: I1213 14:35:56.993178 2015 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=35.631239305 podStartE2EDuration="35.993164422s" podCreationTimestamp="2024-12-13 14:35:21 +0000 UTC" firstStartedPulling="2024-12-13 14:35:56.3552574 +0000 UTC m=+97.570742939" lastFinishedPulling="2024-12-13 14:35:56.717182517 +0000 UTC m=+97.932668056" observedRunningTime="2024-12-13 14:35:56.99278282 +0000 UTC m=+98.208268459" watchObservedRunningTime="2024-12-13 14:35:56.993164422 +0000 UTC m=+98.208649961" Dec 13 14:35:57.507038 kubelet[2015]: E1213 14:35:57.506995 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:58.218342 systemd-networkd[1599]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:35:58.507559 kubelet[2015]: E1213 14:35:58.507455 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:59.442915 kubelet[2015]: E1213 14:35:59.442810 2015 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:59.508585 kubelet[2015]: E1213 14:35:59.508547 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:00.509618 kubelet[2015]: E1213 14:36:00.509559 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:01.510468 kubelet[2015]: E1213 14:36:01.510424 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:02.510876 kubelet[2015]: E1213 14:36:02.510820 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:03.511051 kubelet[2015]: E1213 14:36:03.511005 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:04.511601 kubelet[2015]: E1213 14:36:04.511543 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:05.512490 kubelet[2015]: E1213 14:36:05.512430 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:06.512689 kubelet[2015]: E1213 14:36:06.512644 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:07.513156 kubelet[2015]: E1213 14:36:07.513098 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:36:08.514046 kubelet[2015]: E1213 14:36:08.513990 2015 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"