Dec 13 14:32:16.096448 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:32:16.096473 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:32:16.096482 kernel: BIOS-provided physical RAM map: Dec 13 14:32:16.096490 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:32:16.096497 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Dec 13 14:32:16.096503 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Dec 13 14:32:16.096514 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Dec 13 14:32:16.096521 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Dec 13 14:32:16.096527 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Dec 13 14:32:16.096535 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Dec 13 14:32:16.096541 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Dec 13 14:32:16.096547 kernel: printk: bootconsole [earlyser0] enabled Dec 13 14:32:16.096552 kernel: NX (Execute Disable) protection: active Dec 13 14:32:16.096558 kernel: efi: EFI v2.70 by Microsoft Dec 13 14:32:16.096569 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Dec 13 14:32:16.096578 kernel: random: crng init done Dec 13 14:32:16.096584 kernel: SMBIOS 3.1.0 present. Dec 13 14:32:16.096590 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Dec 13 14:32:16.096599 kernel: Hypervisor detected: Microsoft Hyper-V Dec 13 14:32:16.096606 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Dec 13 14:32:16.096614 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Dec 13 14:32:16.096622 kernel: Hyper-V: Nested features: 0x1e0101 Dec 13 14:32:16.096630 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Dec 13 14:32:16.096637 kernel: Hyper-V: Using hypercall for remote TLB flush Dec 13 14:32:16.096645 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Dec 13 14:32:16.096653 kernel: tsc: Marking TSC unstable due to running on Hyper-V Dec 13 14:32:16.096659 kernel: tsc: Detected 2593.905 MHz processor Dec 13 14:32:16.096666 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:32:16.096674 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:32:16.096682 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Dec 13 14:32:16.096689 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:32:16.096695 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Dec 13 14:32:16.096704 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Dec 13 14:32:16.096710 kernel: Using GB pages for direct mapping Dec 13 14:32:16.096718 kernel: Secure boot disabled Dec 13 14:32:16.096726 kernel: ACPI: Early table checksum verification disabled Dec 13 14:32:16.096733 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Dec 13 14:32:16.096742 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:16.096749 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:16.096755 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Dec 13 14:32:16.096767 kernel: ACPI: FACS 0x000000003FFFE000 000040 Dec 13 14:32:16.096777 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:16.096784 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:16.096793 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:16.096801 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:16.096808 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:16.096819 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:16.096827 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:32:16.096835 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Dec 13 14:32:16.096844 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Dec 13 14:32:16.096851 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Dec 13 14:32:16.096858 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Dec 13 14:32:16.096875 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Dec 13 14:32:16.096885 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Dec 13 14:32:16.096895 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Dec 13 14:32:16.096907 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Dec 13 14:32:16.096920 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Dec 13 14:32:16.096934 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Dec 13 14:32:16.096948 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:32:16.096961 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:32:16.096975 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Dec 13 14:32:16.096989 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Dec 13 14:32:16.097003 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Dec 13 14:32:16.097020 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Dec 13 14:32:16.097035 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Dec 13 14:32:16.097048 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Dec 13 14:32:16.097061 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Dec 13 14:32:16.097074 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Dec 13 14:32:16.097088 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Dec 13 14:32:16.097102 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Dec 13 14:32:16.097117 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Dec 13 14:32:16.097131 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Dec 13 14:32:16.097151 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Dec 13 14:32:16.097164 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Dec 13 14:32:16.097178 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Dec 13 14:32:16.097192 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Dec 13 14:32:16.097206 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Dec 13 14:32:16.097220 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Dec 13 14:32:16.097234 kernel: Zone ranges: Dec 13 14:32:16.097249 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:32:16.097263 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:32:16.097281 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:32:16.097294 kernel: Movable zone start for each node Dec 13 14:32:16.097306 kernel: Early memory node ranges Dec 13 14:32:16.097319 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:32:16.097333 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Dec 13 14:32:16.097346 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Dec 13 14:32:16.097359 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:32:16.097372 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Dec 13 14:32:16.097384 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:32:16.097403 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:32:16.097416 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Dec 13 14:32:16.097429 kernel: ACPI: PM-Timer IO Port: 0x408 Dec 13 14:32:16.097442 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Dec 13 14:32:16.097457 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:32:16.097472 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:32:16.097486 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:32:16.097501 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Dec 13 14:32:16.097515 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:32:16.097535 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Dec 13 14:32:16.097549 kernel: Booting paravirtualized kernel on Hyper-V Dec 13 14:32:16.097562 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:32:16.097576 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:32:16.097589 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:32:16.097602 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:32:16.097614 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:32:16.097627 kernel: Hyper-V: PV spinlocks enabled Dec 13 14:32:16.097640 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:32:16.097657 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Dec 13 14:32:16.097671 kernel: Policy zone: Normal Dec 13 14:32:16.097686 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:32:16.097701 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:32:16.097715 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:32:16.097729 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:32:16.097743 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:32:16.097757 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 308056K reserved, 0K cma-reserved) Dec 13 14:32:16.097778 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:32:16.097791 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:32:16.097811 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:32:16.097824 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:32:16.097837 kernel: rcu: RCU event tracing is enabled. Dec 13 14:32:16.097847 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:32:16.097860 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:32:16.097884 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:32:16.097897 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:32:16.097910 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:32:16.097923 kernel: Using NULL legacy PIC Dec 13 14:32:16.097939 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Dec 13 14:32:16.097953 kernel: Console: colour dummy device 80x25 Dec 13 14:32:16.097967 kernel: printk: console [tty1] enabled Dec 13 14:32:16.097980 kernel: printk: console [ttyS0] enabled Dec 13 14:32:16.097993 kernel: printk: bootconsole [earlyser0] disabled Dec 13 14:32:16.098009 kernel: ACPI: Core revision 20210730 Dec 13 14:32:16.098023 kernel: Failed to register legacy timer interrupt Dec 13 14:32:16.098036 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:32:16.098050 kernel: Hyper-V: Using IPI hypercalls Dec 13 14:32:16.098063 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Dec 13 14:32:16.098076 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:32:16.098089 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:32:16.098103 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:32:16.098116 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:32:16.098130 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:32:16.098146 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:32:16.098160 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:32:16.098173 kernel: RETBleed: Vulnerable Dec 13 14:32:16.098186 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:32:16.098200 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:32:16.098213 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:32:16.098226 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:32:16.098240 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:32:16.098253 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:32:16.098267 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:32:16.098283 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:32:16.098296 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:32:16.098309 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:32:16.098322 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:32:16.098335 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 14:32:16.098349 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 14:32:16.098362 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 14:32:16.098375 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Dec 13 14:32:16.098389 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:32:16.098402 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:32:16.098416 kernel: LSM: Security Framework initializing Dec 13 14:32:16.098429 kernel: SELinux: Initializing. Dec 13 14:32:16.098445 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:32:16.098459 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:32:16.098472 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:32:16.098486 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:32:16.098500 kernel: signal: max sigframe size: 3632 Dec 13 14:32:16.098513 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:32:16.098527 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:32:16.098541 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:32:16.098554 kernel: x86: Booting SMP configuration: Dec 13 14:32:16.098567 kernel: .... node #0, CPUs: #1 Dec 13 14:32:16.098584 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Dec 13 14:32:16.098599 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:32:16.098612 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:32:16.098626 kernel: smpboot: Max logical packages: 1 Dec 13 14:32:16.098639 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Dec 13 14:32:16.098653 kernel: devtmpfs: initialized Dec 13 14:32:16.098666 kernel: x86/mm: Memory block size: 128MB Dec 13 14:32:16.098680 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Dec 13 14:32:16.098695 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:32:16.098709 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:32:16.098723 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:32:16.098737 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:32:16.098750 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:32:16.098764 kernel: audit: type=2000 audit(1734100335.024:1): state=initialized audit_enabled=0 res=1 Dec 13 14:32:16.098777 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:32:16.098790 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:32:16.098805 kernel: cpuidle: using governor menu Dec 13 14:32:16.098820 kernel: ACPI: bus type PCI registered Dec 13 14:32:16.098834 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:32:16.098847 kernel: dca service started, version 1.12.1 Dec 13 14:32:16.098861 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:32:16.102441 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:32:16.102457 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:32:16.102471 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:32:16.102485 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:32:16.102498 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:32:16.102517 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:32:16.102532 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:32:16.102543 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:32:16.102555 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:32:16.102569 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:32:16.102581 kernel: ACPI: Interpreter enabled Dec 13 14:32:16.102595 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:32:16.102607 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:32:16.102620 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:32:16.102637 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Dec 13 14:32:16.102650 kernel: iommu: Default domain type: Translated Dec 13 14:32:16.102664 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:32:16.102677 kernel: vgaarb: loaded Dec 13 14:32:16.102691 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:32:16.102705 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:32:16.102719 kernel: PTP clock support registered Dec 13 14:32:16.102732 kernel: Registered efivars operations Dec 13 14:32:16.102746 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:32:16.102760 kernel: PCI: System does not support PCI Dec 13 14:32:16.102776 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Dec 13 14:32:16.102790 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:32:16.102804 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:32:16.102817 kernel: pnp: PnP ACPI init Dec 13 14:32:16.102831 kernel: pnp: PnP ACPI: found 3 devices Dec 13 14:32:16.102845 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:32:16.102859 kernel: NET: Registered PF_INET protocol family Dec 13 14:32:16.102893 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:32:16.102907 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:32:16.102918 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:32:16.102930 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:32:16.102944 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:32:16.102958 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:32:16.102969 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:32:16.102980 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:32:16.102991 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:32:16.103002 kernel: NET: Registered PF_XDP protocol family Dec 13 14:32:16.103013 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:32:16.103021 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:32:16.103031 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Dec 13 14:32:16.103039 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:32:16.103049 kernel: Initialise system trusted keyrings Dec 13 14:32:16.103057 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:32:16.103068 kernel: Key type asymmetric registered Dec 13 14:32:16.103076 kernel: Asymmetric key parser 'x509' registered Dec 13 14:32:16.103083 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:32:16.103092 kernel: io scheduler mq-deadline registered Dec 13 14:32:16.103100 kernel: io scheduler kyber registered Dec 13 14:32:16.103110 kernel: io scheduler bfq registered Dec 13 14:32:16.103118 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:32:16.103125 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:32:16.103133 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:32:16.103143 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:32:16.103151 kernel: i8042: PNP: No PS/2 controller found. Dec 13 14:32:16.103298 kernel: rtc_cmos 00:02: registered as rtc0 Dec 13 14:32:16.103387 kernel: rtc_cmos 00:02: setting system clock to 2024-12-13T14:32:15 UTC (1734100335) Dec 13 14:32:16.103468 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Dec 13 14:32:16.103478 kernel: fail to initialize ptp_kvm Dec 13 14:32:16.103488 kernel: intel_pstate: CPU model not supported Dec 13 14:32:16.103495 kernel: efifb: probing for efifb Dec 13 14:32:16.103505 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:32:16.103513 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:32:16.103524 kernel: efifb: scrolling: redraw Dec 13 14:32:16.103535 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:32:16.103543 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:32:16.103552 kernel: fb0: EFI VGA frame buffer device Dec 13 14:32:16.103561 kernel: pstore: Registered efi as persistent store backend Dec 13 14:32:16.103570 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:32:16.103578 kernel: Segment Routing with IPv6 Dec 13 14:32:16.103588 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:32:16.103596 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:32:16.103606 kernel: Key type dns_resolver registered Dec 13 14:32:16.103616 kernel: IPI shorthand broadcast: enabled Dec 13 14:32:16.103624 kernel: sched_clock: Marking stable (804746200, 22897600)->(1037090300, -209446500) Dec 13 14:32:16.103634 kernel: registered taskstats version 1 Dec 13 14:32:16.103643 kernel: Loading compiled-in X.509 certificates Dec 13 14:32:16.103652 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:32:16.103659 kernel: Key type .fscrypt registered Dec 13 14:32:16.103666 kernel: Key type fscrypt-provisioning registered Dec 13 14:32:16.103677 kernel: pstore: Using crash dump compression: deflate Dec 13 14:32:16.103689 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:32:16.103697 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:32:16.103705 kernel: ima: No architecture policies found Dec 13 14:32:16.103714 kernel: clk: Disabling unused clocks Dec 13 14:32:16.103723 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:32:16.103733 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:32:16.103741 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:32:16.103749 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:32:16.103759 kernel: Run /init as init process Dec 13 14:32:16.103767 kernel: with arguments: Dec 13 14:32:16.103779 kernel: /init Dec 13 14:32:16.103787 kernel: with environment: Dec 13 14:32:16.103794 kernel: HOME=/ Dec 13 14:32:16.103804 kernel: TERM=linux Dec 13 14:32:16.103812 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:32:16.103824 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:32:16.103834 systemd[1]: Detected virtualization microsoft. Dec 13 14:32:16.103848 systemd[1]: Detected architecture x86-64. Dec 13 14:32:16.103858 systemd[1]: Running in initrd. Dec 13 14:32:16.103884 systemd[1]: No hostname configured, using default hostname. Dec 13 14:32:16.103892 systemd[1]: Hostname set to . Dec 13 14:32:16.103903 systemd[1]: Initializing machine ID from random generator. Dec 13 14:32:16.103911 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:32:16.103921 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:32:16.103929 systemd[1]: Reached target cryptsetup.target. Dec 13 14:32:16.103940 systemd[1]: Reached target paths.target. Dec 13 14:32:16.103950 systemd[1]: Reached target slices.target. Dec 13 14:32:16.103960 systemd[1]: Reached target swap.target. Dec 13 14:32:16.103969 systemd[1]: Reached target timers.target. Dec 13 14:32:16.103980 systemd[1]: Listening on iscsid.socket. Dec 13 14:32:16.103988 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:32:16.103997 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:32:16.104007 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:32:16.104021 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:32:16.104029 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:32:16.104036 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:32:16.104048 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:32:16.104056 systemd[1]: Reached target sockets.target. Dec 13 14:32:16.104066 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:32:16.104074 systemd[1]: Finished network-cleanup.service. Dec 13 14:32:16.104083 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:32:16.104093 systemd[1]: Starting systemd-journald.service... Dec 13 14:32:16.104106 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:32:16.104114 systemd[1]: Starting systemd-resolved.service... Dec 13 14:32:16.104123 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:32:16.104133 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:32:16.104143 kernel: audit: type=1130 audit(1734100336.102:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.104158 systemd-journald[183]: Journal started Dec 13 14:32:16.104211 systemd-journald[183]: Runtime Journal (/run/log/journal/91ed35105b4b4ee4baba9cd8c1c13990) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:32:16.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.092028 systemd-modules-load[184]: Inserted module 'overlay' Dec 13 14:32:16.123037 systemd[1]: Started systemd-journald.service. Dec 13 14:32:16.135466 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:32:16.140006 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:32:16.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.157885 kernel: audit: type=1130 audit(1734100336.134:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.158203 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:32:16.168882 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:32:16.172169 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:32:16.186759 systemd-resolved[185]: Positive Trust Anchors: Dec 13 14:32:16.193160 kernel: Bridge firewalling registered Dec 13 14:32:16.187595 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:32:16.214480 kernel: audit: type=1130 audit(1734100336.139:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.187631 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:32:16.254320 kernel: audit: type=1130 audit(1734100336.144:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.254356 kernel: audit: type=1130 audit(1734100336.240:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.190750 systemd-resolved[185]: Defaulting to hostname 'linux'. Dec 13 14:32:16.197154 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:32:16.214186 systemd-modules-load[184]: Inserted module 'br_netfilter' Dec 13 14:32:16.241149 systemd[1]: Started systemd-resolved.service. Dec 13 14:32:16.278290 kernel: audit: type=1130 audit(1734100336.264:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.277301 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:32:16.279695 systemd[1]: Reached target nss-lookup.target. Dec 13 14:32:16.282413 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:32:16.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.302917 kernel: audit: type=1130 audit(1734100336.279:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.310889 kernel: SCSI subsystem initialized Dec 13 14:32:16.312005 dracut-cmdline[201]: dracut-dracut-053 Dec 13 14:32:16.317841 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:32:16.356982 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:32:16.357083 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:32:16.358374 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:32:16.367235 systemd-modules-load[184]: Inserted module 'dm_multipath' Dec 13 14:32:16.370403 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:32:16.390725 kernel: audit: type=1130 audit(1734100336.372:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.373752 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:32:16.402568 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:32:16.418270 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:32:16.418331 kernel: audit: type=1130 audit(1734100336.406:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.439896 kernel: iscsi: registered transport (tcp) Dec 13 14:32:16.467220 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:32:16.467324 kernel: QLogic iSCSI HBA Driver Dec 13 14:32:16.498430 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:32:16.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.501829 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:32:16.555896 kernel: raid6: avx512x4 gen() 27314 MB/s Dec 13 14:32:16.573875 kernel: raid6: avx512x4 xor() 5852 MB/s Dec 13 14:32:16.593875 kernel: raid6: avx512x2 gen() 27499 MB/s Dec 13 14:32:16.614878 kernel: raid6: avx512x2 xor() 29795 MB/s Dec 13 14:32:16.634874 kernel: raid6: avx512x1 gen() 27062 MB/s Dec 13 14:32:16.654876 kernel: raid6: avx512x1 xor() 26618 MB/s Dec 13 14:32:16.674877 kernel: raid6: avx2x4 gen() 23682 MB/s Dec 13 14:32:16.694874 kernel: raid6: avx2x4 xor() 5835 MB/s Dec 13 14:32:16.714875 kernel: raid6: avx2x2 gen() 25453 MB/s Dec 13 14:32:16.734875 kernel: raid6: avx2x2 xor() 22195 MB/s Dec 13 14:32:16.754873 kernel: raid6: avx2x1 gen() 22236 MB/s Dec 13 14:32:16.774874 kernel: raid6: avx2x1 xor() 19272 MB/s Dec 13 14:32:16.794877 kernel: raid6: sse2x4 gen() 10415 MB/s Dec 13 14:32:16.814873 kernel: raid6: sse2x4 xor() 6534 MB/s Dec 13 14:32:16.834876 kernel: raid6: sse2x2 gen() 11418 MB/s Dec 13 14:32:16.854878 kernel: raid6: sse2x2 xor() 7420 MB/s Dec 13 14:32:16.874873 kernel: raid6: sse2x1 gen() 10343 MB/s Dec 13 14:32:16.898475 kernel: raid6: sse2x1 xor() 5792 MB/s Dec 13 14:32:16.898502 kernel: raid6: using algorithm avx512x2 gen() 27499 MB/s Dec 13 14:32:16.898515 kernel: raid6: .... xor() 29795 MB/s, rmw enabled Dec 13 14:32:16.905280 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:32:16.920896 kernel: xor: automatically using best checksumming function avx Dec 13 14:32:17.020899 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:32:17.030215 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:32:17.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.034000 audit: BPF prog-id=7 op=LOAD Dec 13 14:32:17.034000 audit: BPF prog-id=8 op=LOAD Dec 13 14:32:17.035572 systemd[1]: Starting systemd-udevd.service... Dec 13 14:32:17.050981 systemd-udevd[383]: Using default interface naming scheme 'v252'. Dec 13 14:32:17.055706 systemd[1]: Started systemd-udevd.service. Dec 13 14:32:17.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.065060 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:32:17.082306 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Dec 13 14:32:17.116595 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:32:17.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.120230 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:32:17.160995 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:32:17.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.206890 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:32:17.225914 kernel: hv_vmbus: Vmbus version:5.2 Dec 13 14:32:17.241897 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:32:17.248887 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:32:17.260899 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 14:32:17.272886 kernel: AES CTR mode by8 optimization enabled Dec 13 14:32:17.281890 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:32:17.292989 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:32:17.303763 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:32:17.303836 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 14:32:17.310891 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:32:17.311090 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:32:17.324103 kernel: scsi host0: storvsc_host_t Dec 13 14:32:17.324331 kernel: scsi host1: storvsc_host_t Dec 13 14:32:17.324361 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:32:17.336887 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:32:17.365102 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:32:17.366153 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:32:17.366176 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:32:17.382176 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:32:17.401829 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:32:17.402055 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:32:17.402226 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:32:17.402388 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:32:17.402557 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:32:17.402576 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:32:17.478685 kernel: hv_netvsc 6045bdde-4d66-6045-bdde-4d666045bdde eth0: VF slot 1 added Dec 13 14:32:17.488886 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:32:17.494880 kernel: hv_pci aaa01291-70ef-4a62-8a93-8dff11299bc8: PCI VMBus probing: Using version 0x10004 Dec 13 14:32:17.607895 kernel: hv_pci aaa01291-70ef-4a62-8a93-8dff11299bc8: PCI host bridge to bus 70ef:00 Dec 13 14:32:17.608082 kernel: pci_bus 70ef:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Dec 13 14:32:17.608257 kernel: pci_bus 70ef:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:32:17.608413 kernel: pci 70ef:00:02.0: [15b3:1016] type 00 class 0x020000 Dec 13 14:32:17.608585 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (440) Dec 13 14:32:17.608603 kernel: pci 70ef:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:32:17.608759 kernel: pci 70ef:00:02.0: enabling Extended Tags Dec 13 14:32:17.608931 kernel: pci 70ef:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 70ef:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Dec 13 14:32:17.609097 kernel: pci_bus 70ef:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:32:17.609236 kernel: pci 70ef:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:32:17.544257 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:32:17.576396 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:32:17.598741 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:32:17.617676 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:32:17.623977 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:32:17.630139 systemd[1]: Starting disk-uuid.service... Dec 13 14:32:17.647895 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:32:17.657154 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:32:17.814894 kernel: mlx5_core 70ef:00:02.0: firmware version: 14.30.5000 Dec 13 14:32:18.094571 kernel: mlx5_core 70ef:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 14:32:18.094780 kernel: mlx5_core 70ef:00:02.0: Supported tc offload range - chains: 1, prios: 1 Dec 13 14:32:18.094972 kernel: mlx5_core 70ef:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Dec 13 14:32:18.095129 kernel: hv_netvsc 6045bdde-4d66-6045-bdde-4d666045bdde eth0: VF registering: eth1 Dec 13 14:32:18.095279 kernel: mlx5_core 70ef:00:02.0 eth1: joined to eth0 Dec 13 14:32:18.102889 kernel: mlx5_core 70ef:00:02.0 enP28911s1: renamed from eth1 Dec 13 14:32:18.666902 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:32:18.666991 disk-uuid[549]: The operation has completed successfully. Dec 13 14:32:18.744075 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:32:18.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.744187 systemd[1]: Finished disk-uuid.service. Dec 13 14:32:18.759993 systemd[1]: Starting verity-setup.service... Dec 13 14:32:18.786889 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:32:18.871602 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:32:18.878679 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:32:18.883177 systemd[1]: Finished verity-setup.service. Dec 13 14:32:18.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.955893 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:32:18.956505 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:32:18.960665 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:32:18.965070 systemd[1]: Starting ignition-setup.service... Dec 13 14:32:18.970098 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:32:18.996746 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:32:18.996829 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:32:18.996850 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:32:19.027113 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:32:19.056073 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:32:19.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.061000 audit: BPF prog-id=9 op=LOAD Dec 13 14:32:19.062621 systemd[1]: Starting systemd-networkd.service... Dec 13 14:32:19.090050 systemd-networkd[831]: lo: Link UP Dec 13 14:32:19.090898 systemd-networkd[831]: lo: Gained carrier Dec 13 14:32:19.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.091478 systemd-networkd[831]: Enumeration completed Dec 13 14:32:19.091887 systemd[1]: Started systemd-networkd.service. Dec 13 14:32:19.094547 systemd[1]: Reached target network.target. Dec 13 14:32:19.098704 systemd-networkd[831]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:32:19.109398 systemd[1]: Starting iscsiuio.service... Dec 13 14:32:19.117142 systemd[1]: Finished ignition-setup.service. Dec 13 14:32:19.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.124499 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:32:19.129373 systemd[1]: Started iscsiuio.service. Dec 13 14:32:19.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.135518 systemd[1]: Starting iscsid.service... Dec 13 14:32:19.144990 iscsid[838]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:32:19.144990 iscsid[838]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:32:19.144990 iscsid[838]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:32:19.144990 iscsid[838]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:32:19.144990 iscsid[838]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:32:19.173211 kernel: mlx5_core 70ef:00:02.0 enP28911s1: Link up Dec 13 14:32:19.173502 iscsid[838]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:32:19.177570 systemd[1]: Started iscsid.service. Dec 13 14:32:19.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.182447 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:32:19.197185 kernel: hv_netvsc 6045bdde-4d66-6045-bdde-4d666045bdde eth0: Data path switched to VF: enP28911s1 Dec 13 14:32:19.199385 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:32:19.207066 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:32:19.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.206228 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:32:19.206445 systemd-networkd[831]: enP28911s1: Link UP Dec 13 14:32:19.206557 systemd-networkd[831]: eth0: Link UP Dec 13 14:32:19.206766 systemd-networkd[831]: eth0: Gained carrier Dec 13 14:32:19.212273 systemd-networkd[831]: enP28911s1: Gained carrier Dec 13 14:32:19.214906 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:32:19.217887 systemd[1]: Reached target remote-fs.target. Dec 13 14:32:19.223243 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:32:19.236537 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:32:19.239400 systemd-networkd[831]: eth0: DHCPv4 address 10.200.8.22/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:32:19.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.871636 ignition[836]: Ignition 2.14.0 Dec 13 14:32:19.871651 ignition[836]: Stage: fetch-offline Dec 13 14:32:19.871742 ignition[836]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:19.871789 ignition[836]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:19.910012 ignition[836]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:19.910239 ignition[836]: parsed url from cmdline: "" Dec 13 14:32:19.910244 ignition[836]: no config URL provided Dec 13 14:32:19.910249 ignition[836]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:32:19.910258 ignition[836]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:32:19.913154 ignition[836]: failed to fetch config: resource requires networking Dec 13 14:32:19.919970 ignition[836]: Ignition finished successfully Dec 13 14:32:19.925266 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:32:19.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.929458 systemd[1]: Starting ignition-fetch.service... Dec 13 14:32:19.940480 ignition[858]: Ignition 2.14.0 Dec 13 14:32:19.940490 ignition[858]: Stage: fetch Dec 13 14:32:19.940633 ignition[858]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:19.940669 ignition[858]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:19.946550 ignition[858]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:19.946711 ignition[858]: parsed url from cmdline: "" Dec 13 14:32:19.946716 ignition[858]: no config URL provided Dec 13 14:32:19.946723 ignition[858]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:32:19.946733 ignition[858]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:32:19.946770 ignition[858]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:32:20.048826 ignition[858]: GET result: OK Dec 13 14:32:20.048951 ignition[858]: config has been read from IMDS userdata Dec 13 14:32:20.048980 ignition[858]: parsing config with SHA512: 539706ecf6cc7d05cb55b33c9ddb11d61ace506acc5926e21f32a1a808f50667a613cea4158536c1b62916e93953503315f8db178f30fa6b7c7aa2bc2b7b955b Dec 13 14:32:20.056217 unknown[858]: fetched base config from "system" Dec 13 14:32:20.056752 ignition[858]: fetch: fetch complete Dec 13 14:32:20.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.056235 unknown[858]: fetched base config from "system" Dec 13 14:32:20.056757 ignition[858]: fetch: fetch passed Dec 13 14:32:20.056259 unknown[858]: fetched user config from "azure" Dec 13 14:32:20.056803 ignition[858]: Ignition finished successfully Dec 13 14:32:20.059381 systemd[1]: Finished ignition-fetch.service. Dec 13 14:32:20.063071 systemd[1]: Starting ignition-kargs.service... Dec 13 14:32:20.079412 ignition[864]: Ignition 2.14.0 Dec 13 14:32:20.079420 ignition[864]: Stage: kargs Dec 13 14:32:20.079568 ignition[864]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:20.079598 ignition[864]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:20.085563 ignition[864]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:20.087074 ignition[864]: kargs: kargs passed Dec 13 14:32:20.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.089314 systemd[1]: Finished ignition-kargs.service. Dec 13 14:32:20.087132 ignition[864]: Ignition finished successfully Dec 13 14:32:20.095489 systemd[1]: Starting ignition-disks.service... Dec 13 14:32:20.109609 ignition[870]: Ignition 2.14.0 Dec 13 14:32:20.109620 ignition[870]: Stage: disks Dec 13 14:32:20.109783 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:20.109812 ignition[870]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:20.112699 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:20.116082 ignition[870]: disks: disks passed Dec 13 14:32:20.116150 ignition[870]: Ignition finished successfully Dec 13 14:32:20.123752 systemd[1]: Finished ignition-disks.service. Dec 13 14:32:20.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.127958 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:32:20.133061 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:32:20.135581 systemd[1]: Reached target local-fs.target. Dec 13 14:32:20.141373 systemd[1]: Reached target sysinit.target. Dec 13 14:32:20.145229 systemd[1]: Reached target basic.target. Dec 13 14:32:20.150407 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:32:20.176012 systemd-fsck[878]: ROOT: clean, 621/7326000 files, 481077/7359488 blocks Dec 13 14:32:20.181107 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:32:20.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.187119 systemd[1]: Mounting sysroot.mount... Dec 13 14:32:20.208884 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:32:20.209812 systemd[1]: Mounted sysroot.mount. Dec 13 14:32:20.215305 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:32:20.227738 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:32:20.233419 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:32:20.238256 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:32:20.238299 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:32:20.248734 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:32:20.262176 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:32:20.267598 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:32:20.282889 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (888) Dec 13 14:32:20.283843 initrd-setup-root[893]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:32:20.297816 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:32:20.297857 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:32:20.297887 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:32:20.297911 initrd-setup-root[901]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:32:20.306068 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:32:20.312392 initrd-setup-root[927]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:32:20.318984 initrd-setup-root[935]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:32:20.468166 systemd-networkd[831]: eth0: Gained IPv6LL Dec 13 14:32:20.893336 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:32:20.895700 systemd[1]: Starting ignition-mount.service... Dec 13 14:32:20.920006 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:32:20.920045 kernel: audit: type=1130 audit(1734100340.892:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.897734 systemd[1]: Starting sysroot-boot.service... Dec 13 14:32:20.925695 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:32:20.925845 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:32:21.085590 systemd[1]: Finished sysroot-boot.service. Dec 13 14:32:21.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.102881 kernel: audit: type=1130 audit(1734100341.087:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.139145 ignition[957]: INFO : Ignition 2.14.0 Dec 13 14:32:21.139145 ignition[957]: INFO : Stage: mount Dec 13 14:32:21.143201 ignition[957]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:21.143201 ignition[957]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:21.155161 ignition[957]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:21.158824 ignition[957]: INFO : mount: mount passed Dec 13 14:32:21.158824 ignition[957]: INFO : Ignition finished successfully Dec 13 14:32:21.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.159634 systemd[1]: Finished ignition-mount.service. Dec 13 14:32:21.177908 kernel: audit: type=1130 audit(1734100341.162:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.476990 coreos-metadata[887]: Dec 13 14:32:21.476 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:32:21.485169 coreos-metadata[887]: Dec 13 14:32:21.485 INFO Fetch successful Dec 13 14:32:21.520681 coreos-metadata[887]: Dec 13 14:32:21.520 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:32:21.537874 coreos-metadata[887]: Dec 13 14:32:21.537 INFO Fetch successful Dec 13 14:32:21.543742 coreos-metadata[887]: Dec 13 14:32:21.543 INFO wrote hostname ci-3510.3.6-a-cd3a92fabf to /sysroot/etc/hostname Dec 13 14:32:21.546240 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:32:21.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.553790 systemd[1]: Starting ignition-files.service... Dec 13 14:32:21.566715 kernel: audit: type=1130 audit(1734100341.552:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.572336 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:32:21.586888 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (966) Dec 13 14:32:21.595752 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:32:21.595784 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:32:21.595799 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:32:21.604025 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:32:21.620443 ignition[985]: INFO : Ignition 2.14.0 Dec 13 14:32:21.620443 ignition[985]: INFO : Stage: files Dec 13 14:32:21.624248 ignition[985]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:21.624248 ignition[985]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:21.640190 ignition[985]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:21.648062 ignition[985]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:32:21.651205 ignition[985]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:32:21.651205 ignition[985]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:32:21.665497 ignition[985]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:32:21.669171 ignition[985]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:32:21.672532 ignition[985]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:32:21.669176 unknown[985]: wrote ssh authorized keys file for user: core Dec 13 14:32:21.678848 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:32:21.678848 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:32:21.678848 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:32:21.678848 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:32:21.678848 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:32:21.678848 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:32:21.678848 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:32:21.678848 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:32:21.724896 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (985) Dec 13 14:32:21.707650 systemd[1]: mnt-oem1340992180.mount: Deactivated successfully. Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1340992180" Dec 13 14:32:21.727673 ignition[985]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1340992180": device or resource busy Dec 13 14:32:21.727673 ignition[985]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1340992180", trying btrfs: device or resource busy Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1340992180" Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1340992180" Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1340992180" Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1340992180" Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem417325018" Dec 13 14:32:21.727673 ignition[985]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem417325018": device or resource busy Dec 13 14:32:21.727673 ignition[985]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem417325018", trying btrfs: device or resource busy Dec 13 14:32:21.727673 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem417325018" Dec 13 14:32:21.720195 systemd[1]: mnt-oem417325018.mount: Deactivated successfully. Dec 13 14:32:21.804564 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem417325018" Dec 13 14:32:21.804564 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem417325018" Dec 13 14:32:21.804564 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem417325018" Dec 13 14:32:21.804564 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:32:21.804564 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:32:21.804564 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:32:22.353756 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 14:32:23.425420 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:32:23.425420 ignition[985]: INFO : files: op(f): [started] processing unit "waagent.service" Dec 13 14:32:23.425420 ignition[985]: INFO : files: op(f): [finished] processing unit "waagent.service" Dec 13 14:32:23.425420 ignition[985]: INFO : files: op(10): [started] processing unit "nvidia.service" Dec 13 14:32:23.425420 ignition[985]: INFO : files: op(10): [finished] processing unit "nvidia.service" Dec 13 14:32:23.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.457421 ignition[985]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Dec 13 14:32:23.457421 ignition[985]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Dec 13 14:32:23.457421 ignition[985]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Dec 13 14:32:23.457421 ignition[985]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:32:23.457421 ignition[985]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:32:23.457421 ignition[985]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:32:23.457421 ignition[985]: INFO : files: files passed Dec 13 14:32:23.457421 ignition[985]: INFO : Ignition finished successfully Dec 13 14:32:23.499551 kernel: audit: type=1130 audit(1734100343.443:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.430626 systemd[1]: Finished ignition-files.service. Dec 13 14:32:23.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.485232 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:32:23.528237 kernel: audit: type=1130 audit(1734100343.502:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.528267 kernel: audit: type=1131 audit(1734100343.502:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.487532 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:32:23.535950 initrd-setup-root-after-ignition[1010]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:32:23.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.488828 systemd[1]: Starting ignition-quench.service... Dec 13 14:32:23.554470 kernel: audit: type=1130 audit(1734100343.534:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.495400 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:32:23.495502 systemd[1]: Finished ignition-quench.service. Dec 13 14:32:23.504438 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:32:23.536185 systemd[1]: Reached target ignition-complete.target. Dec 13 14:32:23.553493 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:32:23.572155 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:32:23.572276 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:32:23.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.579102 systemd[1]: Reached target initrd-fs.target. Dec 13 14:32:23.606016 kernel: audit: type=1130 audit(1734100343.578:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.606044 kernel: audit: type=1131 audit(1734100343.578:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.606216 systemd[1]: Reached target initrd.target. Dec 13 14:32:23.609845 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:32:23.614194 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:32:23.625755 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:32:23.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.631029 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:32:23.641851 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:32:23.645927 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:32:23.650292 systemd[1]: Stopped target timers.target. Dec 13 14:32:23.654265 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:32:23.656744 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:32:23.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.660844 systemd[1]: Stopped target initrd.target. Dec 13 14:32:23.664671 systemd[1]: Stopped target basic.target. Dec 13 14:32:23.668362 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:32:23.673024 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:32:23.677541 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:32:23.682280 systemd[1]: Stopped target remote-fs.target. Dec 13 14:32:23.686338 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:32:23.690529 systemd[1]: Stopped target sysinit.target. Dec 13 14:32:23.694403 systemd[1]: Stopped target local-fs.target. Dec 13 14:32:23.698135 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:32:23.703821 systemd[1]: Stopped target swap.target. Dec 13 14:32:23.707548 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:32:23.710036 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:32:23.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.714402 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:32:23.718509 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:32:23.721068 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:32:23.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.725282 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:32:23.728124 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:32:23.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.733258 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:32:23.735623 systemd[1]: Stopped ignition-files.service. Dec 13 14:32:23.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.739568 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:32:23.742282 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:32:23.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.748025 systemd[1]: Stopping ignition-mount.service... Dec 13 14:32:23.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.751905 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:32:23.754053 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:32:23.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.767043 ignition[1023]: INFO : Ignition 2.14.0 Dec 13 14:32:23.767043 ignition[1023]: INFO : Stage: umount Dec 13 14:32:23.767043 ignition[1023]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:23.767043 ignition[1023]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:32:23.754389 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:32:23.784148 ignition[1023]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:32:23.784148 ignition[1023]: INFO : umount: umount passed Dec 13 14:32:23.784148 ignition[1023]: INFO : Ignition finished successfully Dec 13 14:32:23.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.758698 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:32:23.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.758885 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:32:23.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.781983 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:32:23.784028 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:32:23.793383 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:32:23.793511 systemd[1]: Stopped ignition-mount.service. Dec 13 14:32:23.797494 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:32:23.797567 systemd[1]: Stopped ignition-disks.service. Dec 13 14:32:23.802166 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:32:23.802226 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:32:23.811192 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:32:23.811264 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:32:23.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.833242 systemd[1]: Stopped target network.target. Dec 13 14:32:23.837309 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:32:23.839969 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:32:23.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.844571 systemd[1]: Stopped target paths.target. Dec 13 14:32:23.848096 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:32:23.852948 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:32:23.857451 systemd[1]: Stopped target slices.target. Dec 13 14:32:23.861209 systemd[1]: Stopped target sockets.target. Dec 13 14:32:23.865263 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:32:23.865315 systemd[1]: Closed iscsid.socket. Dec 13 14:32:23.872343 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:32:23.872391 systemd[1]: Closed iscsiuio.socket. Dec 13 14:32:23.878438 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:32:23.880882 systemd[1]: Stopped ignition-setup.service. Dec 13 14:32:23.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.884890 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:32:23.888938 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:32:23.894013 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:32:23.897975 systemd-networkd[831]: eth0: DHCPv6 lease lost Dec 13 14:32:23.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.900126 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:32:23.900224 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:32:23.907760 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:32:23.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.908129 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:32:23.915000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:32:23.917000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:32:23.911626 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:32:23.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.911667 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:32:23.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.916992 systemd[1]: Stopping network-cleanup.service... Dec 13 14:32:23.919952 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:32:23.920013 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:32:23.924602 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:32:23.924658 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:32:23.928452 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:32:23.930273 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:32:23.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.945377 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:32:23.951336 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:32:23.959492 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:32:23.961861 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:32:23.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.966085 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:32:23.966138 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:32:23.972893 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:32:23.972945 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:32:23.979605 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:32:23.981891 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:32:23.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.986099 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:32:23.986161 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:32:23.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.992336 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:32:23.992392 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:32:24.006488 kernel: hv_netvsc 6045bdde-4d66-6045-bdde-4d666045bdde eth0: Data path switched from VF: enP28911s1 Dec 13 14:32:23.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.999724 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:32:24.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:24.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:24.007689 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:32:24.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:24.007769 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:32:24.010124 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:32:24.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:24.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:24.010179 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:32:24.013041 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:32:24.013083 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:32:24.023140 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:32:24.024232 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:32:24.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:24.024338 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:32:24.039972 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:32:24.040082 systemd[1]: Stopped network-cleanup.service. Dec 13 14:32:25.836783 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:32:25.837002 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:32:25.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:25.843820 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:32:25.848414 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:32:25.848488 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:32:25.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:25.855712 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:32:25.867616 systemd[1]: Switching root. Dec 13 14:32:25.901490 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Dec 13 14:32:25.901586 iscsid[838]: iscsid shutting down. Dec 13 14:32:25.903557 systemd-journald[183]: Journal stopped Dec 13 14:32:32.864644 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:32:32.864672 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:32:32.864685 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:32:32.864695 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:32:32.864704 kernel: SELinux: policy capability open_perms=1 Dec 13 14:32:32.864711 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:32:32.864723 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:32:32.864736 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:32:32.864745 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:32:32.864752 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:32:32.864763 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:32:32.864771 kernel: kauditd_printk_skb: 36 callbacks suppressed Dec 13 14:32:32.864782 kernel: audit: type=1403 audit(1734100346.608:80): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:32:32.864793 systemd[1]: Successfully loaded SELinux policy in 127.642ms. Dec 13 14:32:32.864809 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 13.304ms. Dec 13 14:32:32.864822 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:32:32.864834 systemd[1]: Detected virtualization microsoft. Dec 13 14:32:32.864846 systemd[1]: Detected architecture x86-64. Dec 13 14:32:32.864857 systemd[1]: Detected first boot. Dec 13 14:32:32.864880 systemd[1]: Hostname set to . Dec 13 14:32:32.864890 systemd[1]: Initializing machine ID from random generator. Dec 13 14:32:32.864902 kernel: audit: type=1400 audit(1734100346.840:81): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:32:32.864912 kernel: audit: type=1400 audit(1734100346.855:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:32:32.864932 kernel: audit: type=1400 audit(1734100346.855:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:32:32.864941 kernel: audit: type=1334 audit(1734100346.881:84): prog-id=10 op=LOAD Dec 13 14:32:32.864953 kernel: audit: type=1334 audit(1734100346.881:85): prog-id=10 op=UNLOAD Dec 13 14:32:32.864965 kernel: audit: type=1334 audit(1734100346.886:86): prog-id=11 op=LOAD Dec 13 14:32:32.864980 kernel: audit: type=1334 audit(1734100346.886:87): prog-id=11 op=UNLOAD Dec 13 14:32:32.864997 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:32:32.865018 kernel: audit: type=1400 audit(1734100347.894:88): avc: denied { associate } for pid=1056 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:32:32.865038 kernel: audit: type=1300 audit(1734100347.894:88): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.865057 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:32:32.865081 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:32.865099 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:32.865117 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:32:32.865138 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:32:32.865154 kernel: audit: type=1334 audit(1734100352.338:90): prog-id=12 op=LOAD Dec 13 14:32:32.865175 kernel: audit: type=1334 audit(1734100352.338:91): prog-id=3 op=UNLOAD Dec 13 14:32:32.865194 kernel: audit: type=1334 audit(1734100352.343:92): prog-id=13 op=LOAD Dec 13 14:32:32.865215 kernel: audit: type=1334 audit(1734100352.348:93): prog-id=14 op=LOAD Dec 13 14:32:32.865234 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:32:32.865254 kernel: audit: type=1334 audit(1734100352.348:94): prog-id=4 op=UNLOAD Dec 13 14:32:32.865275 kernel: audit: type=1334 audit(1734100352.348:95): prog-id=5 op=UNLOAD Dec 13 14:32:32.865294 kernel: audit: type=1131 audit(1734100352.350:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.865310 systemd[1]: Stopped iscsiuio.service. Dec 13 14:32:32.865330 kernel: audit: type=1334 audit(1734100352.395:97): prog-id=12 op=UNLOAD Dec 13 14:32:32.865347 kernel: audit: type=1131 audit(1734100352.402:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.865374 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:32:32.865394 systemd[1]: Stopped iscsid.service. Dec 13 14:32:32.865414 kernel: audit: type=1131 audit(1734100352.426:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.865435 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:32:32.865452 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:32:32.865470 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:32:32.865490 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:32:32.865507 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:32:32.865533 systemd[1]: Created slice system-getty.slice. Dec 13 14:32:32.865551 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:32:32.865570 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:32:32.865596 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:32:32.865617 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:32:32.865636 systemd[1]: Created slice user.slice. Dec 13 14:32:32.865654 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:32:32.865672 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:32:32.865691 systemd[1]: Set up automount boot.automount. Dec 13 14:32:32.865713 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:32:32.865734 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:32:32.865751 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:32:32.865768 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:32:32.865782 systemd[1]: Reached target integritysetup.target. Dec 13 14:32:32.865795 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:32:32.865817 systemd[1]: Reached target remote-fs.target. Dec 13 14:32:32.865831 systemd[1]: Reached target slices.target. Dec 13 14:32:32.865849 systemd[1]: Reached target swap.target. Dec 13 14:32:32.865862 systemd[1]: Reached target torcx.target. Dec 13 14:32:32.866337 systemd[1]: Reached target veritysetup.target. Dec 13 14:32:32.866348 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:32:32.866365 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:32:32.866377 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:32:32.866389 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:32:32.866401 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:32:32.866411 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:32:32.866424 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:32:32.866433 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:32:32.866444 systemd[1]: Mounting media.mount... Dec 13 14:32:32.866457 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:32.866470 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:32:32.866483 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:32:32.866493 systemd[1]: Mounting tmp.mount... Dec 13 14:32:32.866505 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:32:32.866515 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:32.866527 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:32:32.866537 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:32:32.866549 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:32.866559 systemd[1]: Starting modprobe@drm.service... Dec 13 14:32:32.866574 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:32.866584 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:32:32.866597 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:32.866608 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:32:32.866621 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:32:32.866631 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:32:32.866643 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:32:32.866653 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:32:32.866665 kernel: fuse: init (API version 7.34) Dec 13 14:32:32.866677 systemd[1]: Stopped systemd-journald.service. Dec 13 14:32:32.866690 kernel: loop: module loaded Dec 13 14:32:32.866699 systemd[1]: Starting systemd-journald.service... Dec 13 14:32:32.866712 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:32:32.866722 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:32:32.866735 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:32:32.866744 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:32:32.866757 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:32:32.866766 systemd[1]: Stopped verity-setup.service. Dec 13 14:32:32.866788 systemd-journald[1165]: Journal started Dec 13 14:32:32.866842 systemd-journald[1165]: Runtime Journal (/run/log/journal/f37fecc0e8a54934afbd9506afbfc356) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:32:26.608000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:32:26.840000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:32:26.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:32:26.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:32:26.881000 audit: BPF prog-id=10 op=LOAD Dec 13 14:32:26.881000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:32:26.886000 audit: BPF prog-id=11 op=LOAD Dec 13 14:32:26.886000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:32:27.894000 audit[1056]: AVC avc: denied { associate } for pid=1056 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:32:27.894000 audit[1056]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.894000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:32:27.902000 audit[1056]: AVC avc: denied { associate } for pid=1056 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:32:27.902000 audit[1056]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.902000 audit: CWD cwd="/" Dec 13 14:32:27.902000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:27.902000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:27.902000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:32:32.338000 audit: BPF prog-id=12 op=LOAD Dec 13 14:32:32.338000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:32:32.343000 audit: BPF prog-id=13 op=LOAD Dec 13 14:32:32.348000 audit: BPF prog-id=14 op=LOAD Dec 13 14:32:32.348000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:32:32.348000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:32:32.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.395000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:32:32.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.804000 audit: BPF prog-id=15 op=LOAD Dec 13 14:32:32.804000 audit: BPF prog-id=16 op=LOAD Dec 13 14:32:32.804000 audit: BPF prog-id=17 op=LOAD Dec 13 14:32:32.804000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:32:32.804000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:32:32.860000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:32:32.860000 audit[1165]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffdccfde830 a2=4000 a3=7ffdccfde8cc items=0 ppid=1 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.860000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:32:32.336950 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:32:32.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:27.884751 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:32:32.351226 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:32:27.885241 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:32:27.885264 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:32:27.885310 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:32:27.885323 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:32:27.885380 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:32:27.885397 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:32:27.885663 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:32:27.885719 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:32:27.885738 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:32:27.890519 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:32:27.890614 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:32:27.890664 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:32:27.890715 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:32:27.890736 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:32:27.890752 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:32:31.836062 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:31Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:32:31.836352 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:31Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:32:31.836505 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:31Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:32:31.836704 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:31Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:32:31.836757 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:31Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:32:31.836818 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-12-13T14:32:31Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:32:32.875898 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:32.882967 systemd[1]: Started systemd-journald.service. Dec 13 14:32:32.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.884011 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:32:32.886257 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:32:32.888437 systemd[1]: Mounted media.mount. Dec 13 14:32:32.890649 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:32:32.893011 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:32:32.895343 systemd[1]: Mounted tmp.mount. Dec 13 14:32:32.897534 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:32:32.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.900202 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:32:32.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.903157 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:32:32.903367 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:32:32.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.906092 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:32.906295 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:32.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.909135 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:32:32.909328 systemd[1]: Finished modprobe@drm.service. Dec 13 14:32:32.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.911880 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:32.912045 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:32.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.915049 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:32:32.915268 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:32:32.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.917791 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:32.917968 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:32.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.920546 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:32:32.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.924981 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:32:32.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.927781 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:32:32.930591 systemd[1]: Reached target network-pre.target. Dec 13 14:32:32.934841 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:32:32.944237 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:32:32.949896 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:32:32.960506 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:32:32.964198 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:32:32.966560 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:32.968201 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:32:32.970952 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:32:32.972628 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:32:32.976272 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:32:32.983836 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:32:32.986256 systemd-journald[1165]: Time spent on flushing to /var/log/journal/f37fecc0e8a54934afbd9506afbfc356 is 31.341ms for 1133 entries. Dec 13 14:32:32.986256 systemd-journald[1165]: System Journal (/var/log/journal/f37fecc0e8a54934afbd9506afbfc356) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:32:33.056288 systemd-journald[1165]: Received client request to flush runtime journal. Dec 13 14:32:32.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:32.986723 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:32:33.057764 udevadm[1179]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:32:32.995116 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:32:32.999457 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:32:33.006723 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:32:33.009341 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:32:33.028697 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:32:33.057683 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:32:33.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.141324 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:32:33.146296 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:32:33.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.256015 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:32:33.654096 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:32:33.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.656000 audit: BPF prog-id=18 op=LOAD Dec 13 14:32:33.656000 audit: BPF prog-id=19 op=LOAD Dec 13 14:32:33.656000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:32:33.656000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:32:33.658596 systemd[1]: Starting systemd-udevd.service... Dec 13 14:32:33.677613 systemd-udevd[1184]: Using default interface naming scheme 'v252'. Dec 13 14:32:33.763977 systemd[1]: Started systemd-udevd.service. Dec 13 14:32:33.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.772000 audit: BPF prog-id=20 op=LOAD Dec 13 14:32:33.774428 systemd[1]: Starting systemd-networkd.service... Dec 13 14:32:33.806000 audit: BPF prog-id=21 op=LOAD Dec 13 14:32:33.806000 audit: BPF prog-id=22 op=LOAD Dec 13 14:32:33.806000 audit: BPF prog-id=23 op=LOAD Dec 13 14:32:33.808393 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:32:33.847788 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:32:33.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.854861 systemd[1]: Started systemd-userdbd.service. Dec 13 14:32:33.933430 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:32:33.964000 audit[1193]: AVC avc: denied { confidentiality } for pid=1193 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:32:33.977223 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:32:33.986895 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:32:33.997475 systemd-networkd[1197]: lo: Link UP Dec 13 14:32:33.997912 systemd-networkd[1197]: lo: Gained carrier Dec 13 14:32:33.998726 systemd-networkd[1197]: Enumeration completed Dec 13 14:32:33.999123 systemd[1]: Started systemd-networkd.service. Dec 13 14:32:34.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:34.003944 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:32:34.007253 systemd-networkd[1197]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:32:34.016347 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:32:34.016444 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:32:34.016465 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:32:34.024422 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:32:34.031224 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:32:34.041763 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:32:34.042030 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:32:34.307814 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:32:34.307873 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:32:34.307899 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:32:33.964000 audit[1193]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5633740f08e0 a1=f884 a2=7fdb8246abc5 a3=5 items=12 ppid=1184 pid=1193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:33.964000 audit: CWD cwd="/" Dec 13 14:32:33.964000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=1 name=(null) inode=15652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=2 name=(null) inode=15652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=3 name=(null) inode=15653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=4 name=(null) inode=15652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=5 name=(null) inode=15654 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=6 name=(null) inode=15652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=7 name=(null) inode=15655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=8 name=(null) inode=15652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=9 name=(null) inode=15656 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=10 name=(null) inode=15652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PATH item=11 name=(null) inode=15657 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:33.964000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:32:34.343836 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1201) Dec 13 14:32:34.354822 kernel: mlx5_core 70ef:00:02.0 enP28911s1: Link up Dec 13 14:32:34.378795 kernel: hv_netvsc 6045bdde-4d66-6045-bdde-4d666045bdde eth0: Data path switched to VF: enP28911s1 Dec 13 14:32:34.384312 systemd-networkd[1197]: enP28911s1: Link UP Dec 13 14:32:34.384695 systemd-networkd[1197]: eth0: Link UP Dec 13 14:32:34.384878 systemd-networkd[1197]: eth0: Gained carrier Dec 13 14:32:34.388241 systemd-networkd[1197]: enP28911s1: Gained carrier Dec 13 14:32:34.415965 systemd-networkd[1197]: eth0: DHCPv4 address 10.200.8.22/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:32:34.474502 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:32:34.581830 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Dec 13 14:32:34.605267 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:32:34.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:34.609353 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:32:34.689802 lvm[1262]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:32:34.712334 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:32:34.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:34.715416 systemd[1]: Reached target cryptsetup.target. Dec 13 14:32:34.719352 systemd[1]: Starting lvm2-activation.service... Dec 13 14:32:34.726656 lvm[1263]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:32:34.748746 systemd[1]: Finished lvm2-activation.service. Dec 13 14:32:34.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:34.751993 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:32:34.754378 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:32:34.754420 systemd[1]: Reached target local-fs.target. Dec 13 14:32:34.756552 systemd[1]: Reached target machines.target. Dec 13 14:32:34.760204 systemd[1]: Starting ldconfig.service... Dec 13 14:32:34.762640 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:34.762740 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:34.764049 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:32:34.767419 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:32:34.771188 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:32:34.774898 systemd[1]: Starting systemd-sysext.service... Dec 13 14:32:34.789912 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1265 (bootctl) Dec 13 14:32:34.791666 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:32:34.803116 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:32:34.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.100988 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:32:35.195358 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:32:35.195604 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:32:35.215810 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:32:35.235789 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:32:35.252793 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:32:35.256793 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:32:35.258338 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:32:35.258576 (sd-sysext)[1277]: Using extensions 'kubernetes'. Dec 13 14:32:35.259184 (sd-sysext)[1277]: Merged extensions into '/usr'. Dec 13 14:32:35.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.278386 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:35.280388 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:32:35.282729 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:35.285884 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:35.288327 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:35.290480 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:35.291635 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:35.291792 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:35.291938 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:35.296629 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:32:35.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.298106 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:35.298243 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:35.300237 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:35.300358 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:35.300805 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:35.300914 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:35.301703 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:35.301821 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:32:35.303818 systemd[1]: Finished systemd-sysext.service. Dec 13 14:32:35.306504 systemd[1]: Starting ensure-sysext.service... Dec 13 14:32:35.309273 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:32:35.321462 systemd[1]: Reloading. Dec 13 14:32:35.330053 systemd-tmpfiles[1284]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:32:35.334502 systemd-tmpfiles[1284]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:32:35.341261 systemd-tmpfiles[1284]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:32:35.402448 /usr/lib/systemd/system-generators/torcx-generator[1303]: time="2024-12-13T14:32:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:32:35.404041 /usr/lib/systemd/system-generators/torcx-generator[1303]: time="2024-12-13T14:32:35Z" level=info msg="torcx already run" Dec 13 14:32:35.429810 systemd-fsck[1273]: fsck.fat 4.2 (2021-01-31) Dec 13 14:32:35.429810 systemd-fsck[1273]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:32:35.517056 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:35.517079 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:35.536092 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:32:35.576977 systemd-networkd[1197]: eth0: Gained IPv6LL Dec 13 14:32:35.609000 audit: BPF prog-id=24 op=LOAD Dec 13 14:32:35.610000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:32:35.610000 audit: BPF prog-id=25 op=LOAD Dec 13 14:32:35.610000 audit: BPF prog-id=26 op=LOAD Dec 13 14:32:35.610000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:32:35.610000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:32:35.611000 audit: BPF prog-id=27 op=LOAD Dec 13 14:32:35.611000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:32:35.612000 audit: BPF prog-id=28 op=LOAD Dec 13 14:32:35.612000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:32:35.612000 audit: BPF prog-id=29 op=LOAD Dec 13 14:32:35.612000 audit: BPF prog-id=30 op=LOAD Dec 13 14:32:35.612000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:32:35.612000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:32:35.615000 audit: BPF prog-id=31 op=LOAD Dec 13 14:32:35.615000 audit: BPF prog-id=32 op=LOAD Dec 13 14:32:35.615000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:32:35.615000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:32:35.620887 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:32:35.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.624375 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:32:35.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.635595 systemd[1]: Mounting boot.mount... Dec 13 14:32:35.643849 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:35.644217 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:35.646030 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:35.649959 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:35.654959 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:35.657178 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:35.657431 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:35.657734 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:35.661088 systemd[1]: Mounted boot.mount. Dec 13 14:32:35.664233 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:35.664388 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:35.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.668032 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:35.668192 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:35.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.671043 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:35.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.671211 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:35.682349 systemd[1]: Finished ensure-sysext.service. Dec 13 14:32:35.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.688156 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:35.689367 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:35.693261 systemd[1]: Starting modprobe@drm.service... Dec 13 14:32:35.696804 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:35.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.702422 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:35.704656 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:35.704724 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:35.705461 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:32:35.708642 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:35.708843 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:35.711429 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:32:35.711590 systemd[1]: Finished modprobe@drm.service. Dec 13 14:32:35.714314 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:35.714707 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:35.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.718930 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:35.719108 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:35.721604 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:35.721654 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:32:35.788858 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:32:35.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.793691 systemd[1]: Starting audit-rules.service... Dec 13 14:32:35.797499 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:32:35.801782 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:32:35.804000 audit: BPF prog-id=33 op=LOAD Dec 13 14:32:35.807126 systemd[1]: Starting systemd-resolved.service... Dec 13 14:32:35.811000 audit: BPF prog-id=34 op=LOAD Dec 13 14:32:35.813597 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:32:35.817474 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:32:35.832327 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:32:35.832000 audit[1384]: SYSTEM_BOOT pid=1384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.837718 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:32:35.849163 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:32:35.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.897982 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:32:35.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.934027 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:32:35.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:35.936707 systemd[1]: Reached target time-set.target. Dec 13 14:32:35.938000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:32:35.938000 audit[1398]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd269abca0 a2=420 a3=0 items=0 ppid=1378 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.939968 augenrules[1398]: No rules Dec 13 14:32:35.938000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:32:35.940628 systemd[1]: Finished audit-rules.service. Dec 13 14:32:35.961989 systemd-resolved[1382]: Positive Trust Anchors: Dec 13 14:32:35.962008 systemd-resolved[1382]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:32:35.962047 systemd-resolved[1382]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:32:35.984363 systemd-resolved[1382]: Using system hostname 'ci-3510.3.6-a-cd3a92fabf'. Dec 13 14:32:35.986189 systemd[1]: Started systemd-resolved.service. Dec 13 14:32:35.988843 systemd[1]: Reached target network.target. Dec 13 14:32:35.990947 systemd[1]: Reached target network-online.target. Dec 13 14:32:35.993494 systemd[1]: Reached target nss-lookup.target. Dec 13 14:32:36.103958 systemd-timesyncd[1383]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). Dec 13 14:32:36.104066 systemd-timesyncd[1383]: Initial clock synchronization to Fri 2024-12-13 14:32:36.104301 UTC. Dec 13 14:32:36.194329 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:36.194364 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:36.921055 ldconfig[1264]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:32:36.933414 systemd[1]: Finished ldconfig.service. Dec 13 14:32:36.937603 systemd[1]: Starting systemd-update-done.service... Dec 13 14:32:36.951482 systemd[1]: Finished systemd-update-done.service. Dec 13 14:32:36.954215 systemd[1]: Reached target sysinit.target. Dec 13 14:32:36.956245 systemd[1]: Started motdgen.path. Dec 13 14:32:36.957950 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:32:36.960943 systemd[1]: Started logrotate.timer. Dec 13 14:32:36.962890 systemd[1]: Started mdadm.timer. Dec 13 14:32:36.964522 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:32:36.966726 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:32:36.966764 systemd[1]: Reached target paths.target. Dec 13 14:32:36.968606 systemd[1]: Reached target timers.target. Dec 13 14:32:36.971213 systemd[1]: Listening on dbus.socket. Dec 13 14:32:36.974117 systemd[1]: Starting docker.socket... Dec 13 14:32:36.982419 systemd[1]: Listening on sshd.socket. Dec 13 14:32:36.984670 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:36.985262 systemd[1]: Listening on docker.socket. Dec 13 14:32:36.987567 systemd[1]: Reached target sockets.target. Dec 13 14:32:36.989271 systemd[1]: Reached target basic.target. Dec 13 14:32:36.991087 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:32:36.991126 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:32:36.992569 systemd[1]: Starting containerd.service... Dec 13 14:32:36.996288 systemd[1]: Starting dbus.service... Dec 13 14:32:36.999846 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:32:37.003620 systemd[1]: Starting extend-filesystems.service... Dec 13 14:32:37.005963 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:32:37.007717 systemd[1]: Starting kubelet.service... Dec 13 14:32:37.012340 systemd[1]: Starting motdgen.service... Dec 13 14:32:37.016848 systemd[1]: Started nvidia.service. Dec 13 14:32:37.021951 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:32:37.026602 systemd[1]: Starting sshd-keygen.service... Dec 13 14:32:37.032873 systemd[1]: Starting systemd-logind.service... Dec 13 14:32:37.035423 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:37.035561 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:32:37.036336 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:32:37.037544 systemd[1]: Starting update-engine.service... Dec 13 14:32:37.041589 jq[1409]: false Dec 13 14:32:37.041967 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:32:37.049747 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:32:37.050129 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:32:37.053103 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:32:37.053416 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:32:37.060525 jq[1422]: true Dec 13 14:32:37.099194 jq[1426]: true Dec 13 14:32:37.115282 extend-filesystems[1410]: Found loop1 Dec 13 14:32:37.127450 dbus-daemon[1408]: [system] SELinux support is enabled Dec 13 14:32:37.128126 systemd[1]: Started dbus.service. Dec 13 14:32:37.131052 extend-filesystems[1410]: Found sda Dec 13 14:32:37.133410 extend-filesystems[1410]: Found sda1 Dec 13 14:32:37.133410 extend-filesystems[1410]: Found sda2 Dec 13 14:32:37.133410 extend-filesystems[1410]: Found sda3 Dec 13 14:32:37.133410 extend-filesystems[1410]: Found usr Dec 13 14:32:37.133410 extend-filesystems[1410]: Found sda4 Dec 13 14:32:37.133410 extend-filesystems[1410]: Found sda6 Dec 13 14:32:37.133410 extend-filesystems[1410]: Found sda7 Dec 13 14:32:37.133410 extend-filesystems[1410]: Found sda9 Dec 13 14:32:37.133410 extend-filesystems[1410]: Checking size of /dev/sda9 Dec 13 14:32:37.228808 env[1431]: time="2024-12-13T14:32:37.223365824Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:32:37.229243 extend-filesystems[1410]: Old size kept for /dev/sda9 Dec 13 14:32:37.229243 extend-filesystems[1410]: Found sr0 Dec 13 14:32:37.140197 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:32:37.140244 systemd[1]: Reached target system-config.target. Dec 13 14:32:37.154252 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:32:37.154281 systemd[1]: Reached target user-config.target. Dec 13 14:32:37.156925 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:32:37.157174 systemd[1]: Finished motdgen.service. Dec 13 14:32:37.225343 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:32:37.225627 systemd[1]: Finished extend-filesystems.service. Dec 13 14:32:37.262602 bash[1462]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:32:37.263060 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:32:37.277278 systemd-logind[1419]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:32:37.277542 systemd-logind[1419]: New seat seat0. Dec 13 14:32:37.282139 systemd[1]: Started systemd-logind.service. Dec 13 14:32:37.339968 env[1431]: time="2024-12-13T14:32:37.339897471Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:32:37.342060 env[1431]: time="2024-12-13T14:32:37.342020037Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:37.346460 env[1431]: time="2024-12-13T14:32:37.346409074Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:32:37.346631 env[1431]: time="2024-12-13T14:32:37.346589880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:37.347120 env[1431]: time="2024-12-13T14:32:37.347085896Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:32:37.348650 env[1431]: time="2024-12-13T14:32:37.348622344Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:37.348789 env[1431]: time="2024-12-13T14:32:37.348757848Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:32:37.349007 env[1431]: time="2024-12-13T14:32:37.348987255Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:37.349286 env[1431]: time="2024-12-13T14:32:37.349266964Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:37.353187 env[1431]: time="2024-12-13T14:32:37.353158186Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:37.353608 env[1431]: time="2024-12-13T14:32:37.353578199Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:32:37.355832 env[1431]: time="2024-12-13T14:32:37.355805668Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:32:37.356007 env[1431]: time="2024-12-13T14:32:37.355987274Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:32:37.356097 env[1431]: time="2024-12-13T14:32:37.356083477Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:32:37.369662 env[1431]: time="2024-12-13T14:32:37.369370893Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:32:37.369662 env[1431]: time="2024-12-13T14:32:37.369443195Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:32:37.369662 env[1431]: time="2024-12-13T14:32:37.369470396Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:32:37.369662 env[1431]: time="2024-12-13T14:32:37.369549799Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.369984812Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.370029814Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.370055614Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.370077215Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.370098216Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.370118316Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.370138117Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.370159818Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.370366324Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:32:37.370554 env[1431]: time="2024-12-13T14:32:37.370472227Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:32:37.371386 env[1431]: time="2024-12-13T14:32:37.371356855Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:32:37.371517 env[1431]: time="2024-12-13T14:32:37.371497960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.371594 env[1431]: time="2024-12-13T14:32:37.371581362Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:32:37.371731 env[1431]: time="2024-12-13T14:32:37.371716466Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.371927 env[1431]: time="2024-12-13T14:32:37.371909872Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.372017 env[1431]: time="2024-12-13T14:32:37.372000475Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.372099 env[1431]: time="2024-12-13T14:32:37.372086778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.372169 env[1431]: time="2024-12-13T14:32:37.372155580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.372245 env[1431]: time="2024-12-13T14:32:37.372226582Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.372315 env[1431]: time="2024-12-13T14:32:37.372301785Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.372399 env[1431]: time="2024-12-13T14:32:37.372386087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.372498 env[1431]: time="2024-12-13T14:32:37.372485390Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:32:37.372739 env[1431]: time="2024-12-13T14:32:37.372720498Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.372851 env[1431]: time="2024-12-13T14:32:37.372833301Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.372940 env[1431]: time="2024-12-13T14:32:37.372926804Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.373017 env[1431]: time="2024-12-13T14:32:37.373003107Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:32:37.373108 env[1431]: time="2024-12-13T14:32:37.373088009Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:32:37.373171 env[1431]: time="2024-12-13T14:32:37.373158711Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:32:37.373258 env[1431]: time="2024-12-13T14:32:37.373242714Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:32:37.373371 env[1431]: time="2024-12-13T14:32:37.373354118Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:32:37.373850 env[1431]: time="2024-12-13T14:32:37.373738230Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.374023739Z" level=info msg="Connect containerd service" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.374089041Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.374990869Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.375404482Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.375455483Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.375514185Z" level=info msg="containerd successfully booted in 0.172109s" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.384994482Z" level=info msg="Start subscribing containerd event" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.385106485Z" level=info msg="Start recovering state" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.385203888Z" level=info msg="Start event monitor" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.385227389Z" level=info msg="Start snapshots syncer" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.385241590Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:32:37.387030 env[1431]: time="2024-12-13T14:32:37.385252690Z" level=info msg="Start streaming server" Dec 13 14:32:37.387548 update_engine[1421]: I1213 14:32:37.379746 1421 main.cc:92] Flatcar Update Engine starting Dec 13 14:32:37.375745 systemd[1]: Started containerd.service. Dec 13 14:32:37.396837 systemd[1]: Started update-engine.service. Dec 13 14:32:37.402572 systemd[1]: Started locksmithd.service. Dec 13 14:32:37.406596 update_engine[1421]: I1213 14:32:37.406289 1421 update_check_scheduler.cc:74] Next update check in 8m14s Dec 13 14:32:37.463303 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:32:38.215739 systemd[1]: Started kubelet.service. Dec 13 14:32:38.277763 locksmithd[1484]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:32:38.880636 kubelet[1512]: E1213 14:32:38.880573 1512 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:38.883244 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:38.883425 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:38.883809 systemd[1]: kubelet.service: Consumed 1.142s CPU time. Dec 13 14:32:39.478634 sshd_keygen[1443]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:32:39.500755 systemd[1]: Finished sshd-keygen.service. Dec 13 14:32:39.505905 systemd[1]: Starting issuegen.service... Dec 13 14:32:39.509962 systemd[1]: Started waagent.service. Dec 13 14:32:39.517073 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:32:39.517279 systemd[1]: Finished issuegen.service. Dec 13 14:32:39.522013 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:32:39.539306 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:32:39.552468 systemd[1]: Started getty@tty1.service. Dec 13 14:32:39.556796 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:32:39.559866 systemd[1]: Reached target getty.target. Dec 13 14:32:39.562490 systemd[1]: Reached target multi-user.target. Dec 13 14:32:39.567030 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:32:39.579794 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:32:39.579996 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:32:39.582989 systemd[1]: Startup finished in 556ms (firmware) + 8.890s (loader) + 989ms (kernel) + 10.679s (initrd) + 12.900s (userspace) = 34.015s. Dec 13 14:32:39.673240 login[1534]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 14:32:39.674243 login[1533]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:32:39.688994 systemd[1]: Created slice user-500.slice. Dec 13 14:32:39.690762 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:32:39.693938 systemd-logind[1419]: New session 1 of user core. Dec 13 14:32:39.708319 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:32:39.710403 systemd[1]: Starting user@500.service... Dec 13 14:32:39.714240 (systemd)[1537]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:39.826806 systemd[1537]: Queued start job for default target default.target. Dec 13 14:32:39.827497 systemd[1537]: Reached target paths.target. Dec 13 14:32:39.827525 systemd[1537]: Reached target sockets.target. Dec 13 14:32:39.827542 systemd[1537]: Reached target timers.target. Dec 13 14:32:39.827556 systemd[1537]: Reached target basic.target. Dec 13 14:32:39.827696 systemd[1]: Started user@500.service. Dec 13 14:32:39.829159 systemd[1]: Started session-1.scope. Dec 13 14:32:39.829720 systemd[1537]: Reached target default.target. Dec 13 14:32:39.829933 systemd[1537]: Startup finished in 107ms. Dec 13 14:32:40.675715 login[1534]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:32:40.683464 systemd[1]: Started session-2.scope. Dec 13 14:32:40.683761 systemd-logind[1419]: New session 2 of user core. Dec 13 14:32:41.766133 waagent[1528]: 2024-12-13T14:32:41.765997Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:32:41.779511 waagent[1528]: 2024-12-13T14:32:41.767549Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:32:41.779511 waagent[1528]: 2024-12-13T14:32:41.768677Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:32:41.779511 waagent[1528]: 2024-12-13T14:32:41.770064Z INFO Daemon Daemon Run daemon Dec 13 14:32:41.779511 waagent[1528]: 2024-12-13T14:32:41.771445Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:32:41.788818 waagent[1528]: 2024-12-13T14:32:41.788626Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:32:41.799767 waagent[1528]: 2024-12-13T14:32:41.799619Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:32:41.805305 waagent[1528]: 2024-12-13T14:32:41.805213Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:32:41.808265 waagent[1528]: 2024-12-13T14:32:41.808199Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:32:41.811794 waagent[1528]: 2024-12-13T14:32:41.811722Z INFO Daemon Daemon Activate resource disk Dec 13 14:32:41.814595 waagent[1528]: 2024-12-13T14:32:41.814534Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:32:41.825451 waagent[1528]: 2024-12-13T14:32:41.825373Z INFO Daemon Daemon Found device: None Dec 13 14:32:41.828072 waagent[1528]: 2024-12-13T14:32:41.828002Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:32:41.832428 waagent[1528]: 2024-12-13T14:32:41.832362Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:32:41.839067 waagent[1528]: 2024-12-13T14:32:41.839002Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:32:41.842236 waagent[1528]: 2024-12-13T14:32:41.842172Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:32:41.854710 waagent[1528]: 2024-12-13T14:32:41.854582Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:32:41.863365 waagent[1528]: 2024-12-13T14:32:41.863246Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:32:41.868551 waagent[1528]: 2024-12-13T14:32:41.868483Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:32:41.871239 waagent[1528]: 2024-12-13T14:32:41.871178Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:32:41.919455 waagent[1528]: 2024-12-13T14:32:41.915015Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:32:41.951604 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:32:41.964241 waagent[1528]: 2024-12-13T14:32:41.964095Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:32:41.967796 waagent[1528]: 2024-12-13T14:32:41.967703Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:32:41.971371 waagent[1528]: 2024-12-13T14:32:41.971297Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:32:41.975270 waagent[1528]: 2024-12-13T14:32:41.975203Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:32:41.978405 waagent[1528]: 2024-12-13T14:32:41.978338Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:32:41.981155 waagent[1528]: 2024-12-13T14:32:41.981090Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:32:42.025817 waagent[1528]: 2024-12-13T14:32:42.025621Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:32:42.030505 waagent[1528]: 2024-12-13T14:32:42.030451Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:32:42.033826 waagent[1528]: 2024-12-13T14:32:42.033749Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:32:42.667626 waagent[1528]: 2024-12-13T14:32:42.667433Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:32:42.681741 waagent[1528]: 2024-12-13T14:32:42.681645Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:32:42.685143 waagent[1528]: 2024-12-13T14:32:42.685061Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:32:42.764212 waagent[1528]: 2024-12-13T14:32:42.764051Z INFO Daemon Daemon Found private key matching thumbprint 4EBD532472B545270DE63D4673F6FA92437FCF84 Dec 13 14:32:42.768817 waagent[1528]: 2024-12-13T14:32:42.768703Z INFO Daemon Daemon Certificate with thumbprint A6B248A50FDB2C94ED99260DDACC65EED8BC2FF0 has no matching private key. Dec 13 14:32:42.773703 waagent[1528]: 2024-12-13T14:32:42.773615Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:32:42.799929 waagent[1528]: 2024-12-13T14:32:42.799845Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: b6ee900e-2b6e-4cb4-a067-8ba182f1e10d New eTag: 11750528963874875778] Dec 13 14:32:42.805790 waagent[1528]: 2024-12-13T14:32:42.805684Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:32:42.819904 waagent[1528]: 2024-12-13T14:32:42.819815Z INFO Daemon Daemon Starting provisioning Dec 13 14:32:42.822940 waagent[1528]: 2024-12-13T14:32:42.822869Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:32:42.825585 waagent[1528]: 2024-12-13T14:32:42.825524Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-cd3a92fabf] Dec 13 14:32:42.835624 waagent[1528]: 2024-12-13T14:32:42.835505Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-cd3a92fabf] Dec 13 14:32:42.839387 waagent[1528]: 2024-12-13T14:32:42.839307Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:32:42.842730 waagent[1528]: 2024-12-13T14:32:42.842660Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:32:42.861073 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:32:42.861361 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:32:42.861450 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:32:42.861861 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:32:42.866886 systemd-networkd[1197]: eth0: DHCPv6 lease lost Dec 13 14:32:42.868836 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:32:42.869053 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:32:42.871704 systemd[1]: Starting systemd-networkd.service... Dec 13 14:32:42.905152 systemd-networkd[1580]: enP28911s1: Link UP Dec 13 14:32:42.905162 systemd-networkd[1580]: enP28911s1: Gained carrier Dec 13 14:32:42.906703 systemd-networkd[1580]: eth0: Link UP Dec 13 14:32:42.906713 systemd-networkd[1580]: eth0: Gained carrier Dec 13 14:32:42.907187 systemd-networkd[1580]: lo: Link UP Dec 13 14:32:42.907197 systemd-networkd[1580]: lo: Gained carrier Dec 13 14:32:42.907522 systemd-networkd[1580]: eth0: Gained IPv6LL Dec 13 14:32:42.908087 systemd-networkd[1580]: Enumeration completed Dec 13 14:32:42.908210 systemd[1]: Started systemd-networkd.service. Dec 13 14:32:42.911184 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:32:42.914832 waagent[1528]: 2024-12-13T14:32:42.914250Z INFO Daemon Daemon Create user account if not exists Dec 13 14:32:42.918418 systemd-networkd[1580]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:32:42.919522 waagent[1528]: 2024-12-13T14:32:42.919415Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:32:42.923217 waagent[1528]: 2024-12-13T14:32:42.923134Z INFO Daemon Daemon Configure sudoer Dec 13 14:32:42.926897 waagent[1528]: 2024-12-13T14:32:42.926831Z INFO Daemon Daemon Configure sshd Dec 13 14:32:42.929213 waagent[1528]: 2024-12-13T14:32:42.929150Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:32:42.947870 systemd-networkd[1580]: eth0: DHCPv4 address 10.200.8.22/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:32:42.951209 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:32:44.019282 waagent[1528]: 2024-12-13T14:32:44.019166Z INFO Daemon Daemon Provisioning complete Dec 13 14:32:44.034289 waagent[1528]: 2024-12-13T14:32:44.034196Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:32:44.041783 waagent[1528]: 2024-12-13T14:32:44.034848Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:32:44.041783 waagent[1528]: 2024-12-13T14:32:44.036752Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:32:44.323014 waagent[1589]: 2024-12-13T14:32:44.322796Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:32:44.323785 waagent[1589]: 2024-12-13T14:32:44.323705Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:44.323951 waagent[1589]: 2024-12-13T14:32:44.323895Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:44.336181 waagent[1589]: 2024-12-13T14:32:44.336105Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:32:44.336362 waagent[1589]: 2024-12-13T14:32:44.336306Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:32:44.405760 waagent[1589]: 2024-12-13T14:32:44.405601Z INFO ExtHandler ExtHandler Found private key matching thumbprint 4EBD532472B545270DE63D4673F6FA92437FCF84 Dec 13 14:32:44.406052 waagent[1589]: 2024-12-13T14:32:44.405982Z INFO ExtHandler ExtHandler Certificate with thumbprint A6B248A50FDB2C94ED99260DDACC65EED8BC2FF0 has no matching private key. Dec 13 14:32:44.406314 waagent[1589]: 2024-12-13T14:32:44.406262Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:32:44.422111 waagent[1589]: 2024-12-13T14:32:44.422039Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: b04bb8f4-573a-45d4-b4f2-24711a355786 New eTag: 11750528963874875778] Dec 13 14:32:44.422715 waagent[1589]: 2024-12-13T14:32:44.422656Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:32:44.464312 waagent[1589]: 2024-12-13T14:32:44.464142Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:32:44.473890 waagent[1589]: 2024-12-13T14:32:44.473765Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1589 Dec 13 14:32:44.477551 waagent[1589]: 2024-12-13T14:32:44.477472Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:32:44.478832 waagent[1589]: 2024-12-13T14:32:44.478754Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:32:44.512926 waagent[1589]: 2024-12-13T14:32:44.512845Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:32:44.513425 waagent[1589]: 2024-12-13T14:32:44.513355Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:32:44.522958 waagent[1589]: 2024-12-13T14:32:44.522895Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:32:44.523517 waagent[1589]: 2024-12-13T14:32:44.523454Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:32:44.524725 waagent[1589]: 2024-12-13T14:32:44.524659Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:32:44.526132 waagent[1589]: 2024-12-13T14:32:44.526074Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:32:44.526331 waagent[1589]: 2024-12-13T14:32:44.526278Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:44.526491 waagent[1589]: 2024-12-13T14:32:44.526444Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:44.527066 waagent[1589]: 2024-12-13T14:32:44.527015Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:32:44.527379 waagent[1589]: 2024-12-13T14:32:44.527324Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:32:44.527379 waagent[1589]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:32:44.527379 waagent[1589]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:32:44.527379 waagent[1589]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:32:44.527379 waagent[1589]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:44.527379 waagent[1589]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:44.527379 waagent[1589]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:44.531651 waagent[1589]: 2024-12-13T14:32:44.531509Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:32:44.531942 waagent[1589]: 2024-12-13T14:32:44.531883Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:44.532330 waagent[1589]: 2024-12-13T14:32:44.532279Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:44.533107 waagent[1589]: 2024-12-13T14:32:44.533051Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:32:44.533260 waagent[1589]: 2024-12-13T14:32:44.533214Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:32:44.533548 waagent[1589]: 2024-12-13T14:32:44.533493Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:32:44.534934 waagent[1589]: 2024-12-13T14:32:44.534874Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:32:44.535085 waagent[1589]: 2024-12-13T14:32:44.535029Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:32:44.535690 waagent[1589]: 2024-12-13T14:32:44.535625Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:32:44.535844 waagent[1589]: 2024-12-13T14:32:44.535794Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:32:44.536093 waagent[1589]: 2024-12-13T14:32:44.536044Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:32:44.556755 waagent[1589]: 2024-12-13T14:32:44.553171Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:32:44.556755 waagent[1589]: 2024-12-13T14:32:44.554155Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:32:44.556755 waagent[1589]: 2024-12-13T14:32:44.555421Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:32:44.559212 waagent[1589]: 2024-12-13T14:32:44.559128Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1580' Dec 13 14:32:44.584336 waagent[1589]: 2024-12-13T14:32:44.584112Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:32:44.584336 waagent[1589]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:32:44.584336 waagent[1589]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:32:44.584336 waagent[1589]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:4d:66 brd ff:ff:ff:ff:ff:ff Dec 13 14:32:44.584336 waagent[1589]: 3: enP28911s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:4d:66 brd ff:ff:ff:ff:ff:ff\ altname enP28911p0s2 Dec 13 14:32:44.584336 waagent[1589]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:32:44.584336 waagent[1589]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:32:44.584336 waagent[1589]: 2: eth0 inet 10.200.8.22/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:32:44.584336 waagent[1589]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:32:44.584336 waagent[1589]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:32:44.584336 waagent[1589]: 2: eth0 inet6 fe80::6245:bdff:fede:4d66/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:32:44.612113 waagent[1589]: 2024-12-13T14:32:44.612033Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:32:44.739680 waagent[1589]: 2024-12-13T14:32:44.739557Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Dec 13 14:32:44.744527 waagent[1589]: 2024-12-13T14:32:44.744396Z INFO EnvHandler ExtHandler Firewall rules: Dec 13 14:32:44.744527 waagent[1589]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:44.744527 waagent[1589]: pkts bytes target prot opt in out source destination Dec 13 14:32:44.744527 waagent[1589]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:44.744527 waagent[1589]: pkts bytes target prot opt in out source destination Dec 13 14:32:44.744527 waagent[1589]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:44.744527 waagent[1589]: pkts bytes target prot opt in out source destination Dec 13 14:32:44.744527 waagent[1589]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:32:44.744527 waagent[1589]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:32:44.746362 waagent[1589]: 2024-12-13T14:32:44.746294Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:32:44.937362 waagent[1589]: 2024-12-13T14:32:44.937271Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:32:45.041230 waagent[1528]: 2024-12-13T14:32:45.041022Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:32:45.047619 waagent[1528]: 2024-12-13T14:32:45.047543Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:32:46.120240 waagent[1626]: 2024-12-13T14:32:46.120093Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:32:46.121047 waagent[1626]: 2024-12-13T14:32:46.120977Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:32:46.121195 waagent[1626]: 2024-12-13T14:32:46.121143Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:32:46.121346 waagent[1626]: 2024-12-13T14:32:46.121299Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Dec 13 14:32:46.131594 waagent[1626]: 2024-12-13T14:32:46.131493Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:32:46.131999 waagent[1626]: 2024-12-13T14:32:46.131944Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:46.132164 waagent[1626]: 2024-12-13T14:32:46.132116Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:46.145251 waagent[1626]: 2024-12-13T14:32:46.145176Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:32:46.154508 waagent[1626]: 2024-12-13T14:32:46.154443Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:32:46.155475 waagent[1626]: 2024-12-13T14:32:46.155415Z INFO ExtHandler Dec 13 14:32:46.155623 waagent[1626]: 2024-12-13T14:32:46.155571Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: ed665776-dae6-4d53-9e85-1360a095c23c eTag: 11750528963874875778 source: Fabric] Dec 13 14:32:46.156342 waagent[1626]: 2024-12-13T14:32:46.156286Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:32:46.157457 waagent[1626]: 2024-12-13T14:32:46.157396Z INFO ExtHandler Dec 13 14:32:46.157596 waagent[1626]: 2024-12-13T14:32:46.157542Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:32:46.164649 waagent[1626]: 2024-12-13T14:32:46.164596Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:32:46.165108 waagent[1626]: 2024-12-13T14:32:46.165061Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:32:46.185151 waagent[1626]: 2024-12-13T14:32:46.185074Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:32:46.257420 waagent[1626]: 2024-12-13T14:32:46.257264Z INFO ExtHandler Downloaded certificate {'thumbprint': 'A6B248A50FDB2C94ED99260DDACC65EED8BC2FF0', 'hasPrivateKey': False} Dec 13 14:32:46.258477 waagent[1626]: 2024-12-13T14:32:46.258403Z INFO ExtHandler Downloaded certificate {'thumbprint': '4EBD532472B545270DE63D4673F6FA92437FCF84', 'hasPrivateKey': True} Dec 13 14:32:46.259500 waagent[1626]: 2024-12-13T14:32:46.259433Z INFO ExtHandler Fetch goal state completed Dec 13 14:32:46.279580 waagent[1626]: 2024-12-13T14:32:46.279468Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:32:46.291914 waagent[1626]: 2024-12-13T14:32:46.291815Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1626 Dec 13 14:32:46.295135 waagent[1626]: 2024-12-13T14:32:46.295066Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:32:46.296169 waagent[1626]: 2024-12-13T14:32:46.296109Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:32:46.296470 waagent[1626]: 2024-12-13T14:32:46.296415Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:32:46.298482 waagent[1626]: 2024-12-13T14:32:46.298425Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:32:46.303927 waagent[1626]: 2024-12-13T14:32:46.303872Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:32:46.304340 waagent[1626]: 2024-12-13T14:32:46.304282Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:32:46.313424 waagent[1626]: 2024-12-13T14:32:46.313370Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:32:46.313926 waagent[1626]: 2024-12-13T14:32:46.313870Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:32:46.327899 waagent[1626]: 2024-12-13T14:32:46.327785Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Dec 13 14:32:46.330926 waagent[1626]: 2024-12-13T14:32:46.330826Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Dec 13 14:32:46.332032 waagent[1626]: 2024-12-13T14:32:46.331968Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:32:46.333659 waagent[1626]: 2024-12-13T14:32:46.333598Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:32:46.334130 waagent[1626]: 2024-12-13T14:32:46.334075Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:46.334294 waagent[1626]: 2024-12-13T14:32:46.334246Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:46.334922 waagent[1626]: 2024-12-13T14:32:46.334866Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:32:46.335215 waagent[1626]: 2024-12-13T14:32:46.335162Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:32:46.335215 waagent[1626]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:32:46.335215 waagent[1626]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:32:46.335215 waagent[1626]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:32:46.335215 waagent[1626]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:46.335215 waagent[1626]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:46.335215 waagent[1626]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:46.337542 waagent[1626]: 2024-12-13T14:32:46.337455Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:32:46.339356 waagent[1626]: 2024-12-13T14:32:46.338967Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:32:46.339507 waagent[1626]: 2024-12-13T14:32:46.339450Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:32:46.340734 waagent[1626]: 2024-12-13T14:32:46.340678Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:46.340981 waagent[1626]: 2024-12-13T14:32:46.340925Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:32:46.343181 waagent[1626]: 2024-12-13T14:32:46.343071Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:46.343436 waagent[1626]: 2024-12-13T14:32:46.343358Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:32:46.345047 waagent[1626]: 2024-12-13T14:32:46.344994Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:32:46.346398 waagent[1626]: 2024-12-13T14:32:46.346331Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:32:46.348350 waagent[1626]: 2024-12-13T14:32:46.348236Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:32:46.350067 waagent[1626]: 2024-12-13T14:32:46.350006Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:32:46.350067 waagent[1626]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:32:46.350067 waagent[1626]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:32:46.350067 waagent[1626]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:4d:66 brd ff:ff:ff:ff:ff:ff Dec 13 14:32:46.350067 waagent[1626]: 3: enP28911s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:4d:66 brd ff:ff:ff:ff:ff:ff\ altname enP28911p0s2 Dec 13 14:32:46.350067 waagent[1626]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:32:46.350067 waagent[1626]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:32:46.350067 waagent[1626]: 2: eth0 inet 10.200.8.22/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:32:46.350067 waagent[1626]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:32:46.350067 waagent[1626]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:32:46.350067 waagent[1626]: 2: eth0 inet6 fe80::6245:bdff:fede:4d66/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:32:46.354946 waagent[1626]: 2024-12-13T14:32:46.354695Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:32:46.378510 waagent[1626]: 2024-12-13T14:32:46.378388Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:32:46.424013 waagent[1626]: 2024-12-13T14:32:46.423880Z INFO ExtHandler ExtHandler Dec 13 14:32:46.424495 waagent[1626]: 2024-12-13T14:32:46.424422Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 5b99461a-e3e0-4181-a867-694646f30daa correlation 1aa8d927-e762-4af8-a6a0-9bf69bbc93b9 created: 2024-12-13T14:31:45.774109Z] Dec 13 14:32:46.426684 waagent[1626]: 2024-12-13T14:32:46.426625Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:32:46.432360 waagent[1626]: 2024-12-13T14:32:46.432120Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 8 ms] Dec 13 14:32:46.442508 waagent[1626]: 2024-12-13T14:32:46.442435Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:32:46.442508 waagent[1626]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:46.442508 waagent[1626]: pkts bytes target prot opt in out source destination Dec 13 14:32:46.442508 waagent[1626]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:46.442508 waagent[1626]: pkts bytes target prot opt in out source destination Dec 13 14:32:46.442508 waagent[1626]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:46.442508 waagent[1626]: pkts bytes target prot opt in out source destination Dec 13 14:32:46.442508 waagent[1626]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:32:46.442508 waagent[1626]: 172 20161 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:32:46.442508 waagent[1626]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:32:46.460208 waagent[1626]: 2024-12-13T14:32:46.460137Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:32:46.475222 waagent[1626]: 2024-12-13T14:32:46.475143Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 5F135DFF-D0A9-41D6-B1B8-3DB4730B9C18;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:32:48.917232 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:32:48.917589 systemd[1]: Stopped kubelet.service. Dec 13 14:32:48.917665 systemd[1]: kubelet.service: Consumed 1.142s CPU time. Dec 13 14:32:48.920140 systemd[1]: Starting kubelet.service... Dec 13 14:32:49.021890 systemd[1]: Started kubelet.service. Dec 13 14:32:49.578507 kubelet[1674]: E1213 14:32:49.578436 1674 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:49.581801 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:49.581980 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:59.667343 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:32:59.667702 systemd[1]: Stopped kubelet.service. Dec 13 14:32:59.670234 systemd[1]: Starting kubelet.service... Dec 13 14:33:00.106264 systemd[1]: Started kubelet.service. Dec 13 14:33:00.322329 kubelet[1685]: E1213 14:33:00.322259 1685 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:00.324297 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:00.324423 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:10.417150 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:33:10.417446 systemd[1]: Stopped kubelet.service. Dec 13 14:33:10.419660 systemd[1]: Starting kubelet.service... Dec 13 14:33:10.642749 systemd[1]: Started kubelet.service. Dec 13 14:33:10.685597 kubelet[1694]: E1213 14:33:10.685463 1694 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:10.687556 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:10.687748 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:20.917235 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:33:20.917588 systemd[1]: Stopped kubelet.service. Dec 13 14:33:20.920027 systemd[1]: Starting kubelet.service... Dec 13 14:33:21.261564 systemd[1]: Started kubelet.service. Dec 13 14:33:21.553415 kubelet[1703]: E1213 14:33:21.553261 1703 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:21.555183 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:21.555311 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:22.412757 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Dec 13 14:33:23.017047 update_engine[1421]: I1213 14:33:23.016970 1421 update_attempter.cc:509] Updating boot flags... Dec 13 14:33:23.261183 systemd[1]: Created slice system-sshd.slice. Dec 13 14:33:23.263553 systemd[1]: Started sshd@0-10.200.8.22:22-10.200.16.10:59226.service. Dec 13 14:33:24.022294 sshd[1749]: Accepted publickey for core from 10.200.16.10 port 59226 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:33:24.024023 sshd[1749]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:24.028914 systemd-logind[1419]: New session 3 of user core. Dec 13 14:33:24.029643 systemd[1]: Started session-3.scope. Dec 13 14:33:24.637709 systemd[1]: Started sshd@1-10.200.8.22:22-10.200.16.10:59228.service. Dec 13 14:33:25.343956 sshd[1754]: Accepted publickey for core from 10.200.16.10 port 59228 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:33:25.346022 sshd[1754]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:25.351602 systemd[1]: Started session-4.scope. Dec 13 14:33:25.352264 systemd-logind[1419]: New session 4 of user core. Dec 13 14:33:25.847756 sshd[1754]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:25.851591 systemd[1]: sshd@1-10.200.8.22:22-10.200.16.10:59228.service: Deactivated successfully. Dec 13 14:33:25.852715 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:33:25.853458 systemd-logind[1419]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:33:25.854301 systemd-logind[1419]: Removed session 4. Dec 13 14:33:25.966956 systemd[1]: Started sshd@2-10.200.8.22:22-10.200.16.10:59238.service. Dec 13 14:33:26.676554 sshd[1760]: Accepted publickey for core from 10.200.16.10 port 59238 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:33:26.678221 sshd[1760]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:26.683607 systemd[1]: Started session-5.scope. Dec 13 14:33:26.684260 systemd-logind[1419]: New session 5 of user core. Dec 13 14:33:27.173572 sshd[1760]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:27.177312 systemd[1]: sshd@2-10.200.8.22:22-10.200.16.10:59238.service: Deactivated successfully. Dec 13 14:33:27.178465 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:33:27.179290 systemd-logind[1419]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:33:27.180277 systemd-logind[1419]: Removed session 5. Dec 13 14:33:27.293365 systemd[1]: Started sshd@3-10.200.8.22:22-10.200.16.10:59252.service. Dec 13 14:33:28.001467 sshd[1766]: Accepted publickey for core from 10.200.16.10 port 59252 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:33:28.003406 sshd[1766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:28.008903 systemd[1]: Started session-6.scope. Dec 13 14:33:28.009570 systemd-logind[1419]: New session 6 of user core. Dec 13 14:33:28.505137 sshd[1766]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:28.509007 systemd[1]: sshd@3-10.200.8.22:22-10.200.16.10:59252.service: Deactivated successfully. Dec 13 14:33:28.510150 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:33:28.511045 systemd-logind[1419]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:33:28.512021 systemd-logind[1419]: Removed session 6. Dec 13 14:33:28.625244 systemd[1]: Started sshd@4-10.200.8.22:22-10.200.16.10:42382.service. Dec 13 14:33:29.333800 sshd[1772]: Accepted publickey for core from 10.200.16.10 port 42382 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:33:29.335821 sshd[1772]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:29.341966 systemd[1]: Started session-7.scope. Dec 13 14:33:29.342632 systemd-logind[1419]: New session 7 of user core. Dec 13 14:33:29.792010 sudo[1775]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:33:29.792328 sudo[1775]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:33:29.804076 dbus-daemon[1408]: \xd0Me\xbe\xe0U: received setenforce notice (enforcing=-166625968) Dec 13 14:33:29.806374 sudo[1775]: pam_unix(sudo:session): session closed for user root Dec 13 14:33:29.927058 sshd[1772]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:29.931500 systemd[1]: sshd@4-10.200.8.22:22-10.200.16.10:42382.service: Deactivated successfully. Dec 13 14:33:29.932795 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:33:29.933621 systemd-logind[1419]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:33:29.934547 systemd-logind[1419]: Removed session 7. Dec 13 14:33:30.046953 systemd[1]: Started sshd@5-10.200.8.22:22-10.200.16.10:42386.service. Dec 13 14:33:30.755925 sshd[1779]: Accepted publickey for core from 10.200.16.10 port 42386 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:33:30.757910 sshd[1779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:30.763277 systemd[1]: Started session-8.scope. Dec 13 14:33:30.763927 systemd-logind[1419]: New session 8 of user core. Dec 13 14:33:31.143943 sudo[1783]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:33:31.144715 sudo[1783]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:33:31.148319 sudo[1783]: pam_unix(sudo:session): session closed for user root Dec 13 14:33:31.153939 sudo[1782]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:33:31.154241 sudo[1782]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:33:31.165088 systemd[1]: Stopping audit-rules.service... Dec 13 14:33:31.166000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:33:31.167264 auditctl[1786]: No rules Dec 13 14:33:31.170051 kernel: kauditd_printk_skb: 126 callbacks suppressed Dec 13 14:33:31.170137 kernel: audit: type=1305 audit(1734100411.166:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:33:31.167715 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:33:31.167918 systemd[1]: Stopped audit-rules.service. Dec 13 14:33:31.170960 systemd[1]: Starting audit-rules.service... Dec 13 14:33:31.166000 audit[1786]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc6a090c0 a2=420 a3=0 items=0 ppid=1 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:31.196014 augenrules[1803]: No rules Dec 13 14:33:31.166000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:33:31.198223 systemd[1]: Finished audit-rules.service. Dec 13 14:33:31.202364 kernel: audit: type=1300 audit(1734100411.166:207): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc6a090c0 a2=420 a3=0 items=0 ppid=1 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:31.202466 kernel: audit: type=1327 audit(1734100411.166:207): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:33:31.202571 sudo[1782]: pam_unix(sudo:session): session closed for user root Dec 13 14:33:31.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.226909 kernel: audit: type=1131 audit(1734100411.166:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.227021 kernel: audit: type=1130 audit(1734100411.197:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.227050 kernel: audit: type=1106 audit(1734100411.201:210): pid=1782 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.201000 audit[1782]: USER_END pid=1782 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.201000 audit[1782]: CRED_DISP pid=1782 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.250659 kernel: audit: type=1104 audit(1734100411.201:211): pid=1782 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.319707 sshd[1779]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:31.320000 audit[1779]: USER_END pid=1779 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:31.323804 systemd[1]: sshd@5-10.200.8.22:22-10.200.16.10:42386.service: Deactivated successfully. Dec 13 14:33:31.324856 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:33:31.326750 systemd-logind[1419]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:33:31.328048 systemd-logind[1419]: Removed session 8. Dec 13 14:33:31.321000 audit[1779]: CRED_DISP pid=1779 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:31.351510 kernel: audit: type=1106 audit(1734100411.320:212): pid=1779 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:31.351657 kernel: audit: type=1104 audit(1734100411.321:213): pid=1779 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:31.351697 kernel: audit: type=1131 audit(1734100411.323:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.22:22-10.200.16.10:42386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.22:22-10.200.16.10:42386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.439255 systemd[1]: Started sshd@6-10.200.8.22:22-10.200.16.10:42392.service. Dec 13 14:33:31.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.22:22-10.200.16.10:42392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.667378 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:33:31.667739 systemd[1]: Stopped kubelet.service. Dec 13 14:33:31.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.670310 systemd[1]: Starting kubelet.service... Dec 13 14:33:31.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:31.848504 systemd[1]: Started kubelet.service. Dec 13 14:33:32.148000 audit[1809]: USER_ACCT pid=1809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:32.149940 sshd[1809]: Accepted publickey for core from 10.200.16.10 port 42392 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:33:32.150000 audit[1809]: CRED_ACQ pid=1809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:32.150000 audit[1809]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbfa86b40 a2=3 a3=0 items=0 ppid=1 pid=1809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.150000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:33:32.151940 sshd[1809]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:32.157498 systemd[1]: Started session-9.scope. Dec 13 14:33:32.158007 systemd-logind[1419]: New session 9 of user core. Dec 13 14:33:32.161000 audit[1809]: USER_START pid=1809 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:32.163000 audit[1820]: CRED_ACQ pid=1820 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:32.308557 kubelet[1815]: E1213 14:33:32.308490 1815 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:32.310474 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:32.310661 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:32.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:33:32.536000 audit[1821]: USER_ACCT pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.537000 audit[1821]: CRED_REFR pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.537890 sudo[1821]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:33:32.538275 sudo[1821]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:33:32.539000 audit[1821]: USER_START pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.553493 systemd[1]: Starting coreos-metadata.service... Dec 13 14:33:32.601125 coreos-metadata[1825]: Dec 13 14:33:32.600 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:33:32.603931 coreos-metadata[1825]: Dec 13 14:33:32.603 INFO Fetch successful Dec 13 14:33:32.604234 coreos-metadata[1825]: Dec 13 14:33:32.604 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Dec 13 14:33:32.605761 coreos-metadata[1825]: Dec 13 14:33:32.605 INFO Fetch successful Dec 13 14:33:32.606197 coreos-metadata[1825]: Dec 13 14:33:32.606 INFO Fetching http://168.63.129.16/machine/275cba0e-107c-41d8-b534-627a1d8ff7a0/0f5e4738%2Db750%2D416c%2Da894%2D1731024be8f4.%5Fci%2D3510.3.6%2Da%2Dcd3a92fabf?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Dec 13 14:33:32.607743 coreos-metadata[1825]: Dec 13 14:33:32.607 INFO Fetch successful Dec 13 14:33:32.640745 coreos-metadata[1825]: Dec 13 14:33:32.640 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:33:32.654332 coreos-metadata[1825]: Dec 13 14:33:32.654 INFO Fetch successful Dec 13 14:33:32.664251 systemd[1]: Finished coreos-metadata.service. Dec 13 14:33:32.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:33.203190 systemd[1]: Stopped kubelet.service. Dec 13 14:33:33.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:33.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:33.206988 systemd[1]: Starting kubelet.service... Dec 13 14:33:33.250104 systemd[1]: Reloading. Dec 13 14:33:33.389820 /usr/lib/systemd/system-generators/torcx-generator[1878]: time="2024-12-13T14:33:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:33:33.389863 /usr/lib/systemd/system-generators/torcx-generator[1878]: time="2024-12-13T14:33:33Z" level=info msg="torcx already run" Dec 13 14:33:33.489170 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:33:33.489193 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:33:33.506563 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:33:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit: BPF prog-id=41 op=LOAD Dec 13 14:33:33.575000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit: BPF prog-id=42 op=LOAD Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.575000 audit: BPF prog-id=43 op=LOAD Dec 13 14:33:33.575000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:33:33.575000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.576000 audit: BPF prog-id=44 op=LOAD Dec 13 14:33:33.576000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.579000 audit: BPF prog-id=45 op=LOAD Dec 13 14:33:33.579000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.580000 audit: BPF prog-id=46 op=LOAD Dec 13 14:33:33.580000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit: BPF prog-id=47 op=LOAD Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.581000 audit: BPF prog-id=48 op=LOAD Dec 13 14:33:33.581000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:33:33.581000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:33:33.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit: BPF prog-id=49 op=LOAD Dec 13 14:33:33.583000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit: BPF prog-id=50 op=LOAD Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit: BPF prog-id=51 op=LOAD Dec 13 14:33:33.583000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:33:33.583000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.584000 audit: BPF prog-id=52 op=LOAD Dec 13 14:33:33.584000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit: BPF prog-id=53 op=LOAD Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.586000 audit: BPF prog-id=54 op=LOAD Dec 13 14:33:33.587000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:33:33.587000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.588000 audit: BPF prog-id=55 op=LOAD Dec 13 14:33:33.588000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:33:33.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:33.608646 systemd[1]: Started kubelet.service. Dec 13 14:33:33.614727 systemd[1]: Stopping kubelet.service... Dec 13 14:33:33.615410 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:33:33.615646 systemd[1]: Stopped kubelet.service. Dec 13 14:33:33.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:33.617534 systemd[1]: Starting kubelet.service... Dec 13 14:33:33.849237 systemd[1]: Started kubelet.service. Dec 13 14:33:33.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:34.528627 kubelet[1951]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:34.529205 kubelet[1951]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:33:34.529297 kubelet[1951]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:34.529513 kubelet[1951]: I1213 14:33:34.529480 1951 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:33:35.007079 kubelet[1951]: I1213 14:33:35.007019 1951 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:33:35.007079 kubelet[1951]: I1213 14:33:35.007069 1951 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:33:35.008410 kubelet[1951]: I1213 14:33:35.008379 1951 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:33:35.031459 kubelet[1951]: I1213 14:33:35.031413 1951 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:33:35.040152 kubelet[1951]: E1213 14:33:35.040106 1951 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:33:35.040152 kubelet[1951]: I1213 14:33:35.040147 1951 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:33:35.045333 kubelet[1951]: I1213 14:33:35.045295 1951 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:33:35.050363 kubelet[1951]: I1213 14:33:35.050321 1951 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:33:35.050558 kubelet[1951]: I1213 14:33:35.050525 1951 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:33:35.051052 kubelet[1951]: I1213 14:33:35.050556 1951 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.8.22","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:33:35.051052 kubelet[1951]: I1213 14:33:35.050846 1951 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:33:35.051052 kubelet[1951]: I1213 14:33:35.050862 1951 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:33:35.051052 kubelet[1951]: I1213 14:33:35.051021 1951 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:35.060354 kubelet[1951]: I1213 14:33:35.060323 1951 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:33:35.060485 kubelet[1951]: I1213 14:33:35.060371 1951 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:33:35.060485 kubelet[1951]: I1213 14:33:35.060418 1951 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:33:35.060485 kubelet[1951]: I1213 14:33:35.060439 1951 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:33:35.061062 kubelet[1951]: E1213 14:33:35.061028 1951 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:35.061154 kubelet[1951]: E1213 14:33:35.061082 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:35.067222 kubelet[1951]: I1213 14:33:35.067197 1951 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:33:35.077226 kubelet[1951]: I1213 14:33:35.077180 1951 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:33:35.077833 kubelet[1951]: W1213 14:33:35.077809 1951 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:33:35.078543 kubelet[1951]: I1213 14:33:35.078522 1951 server.go:1269] "Started kubelet" Dec 13 14:33:35.088100 kubelet[1951]: I1213 14:33:35.088049 1951 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:33:35.089702 kubelet[1951]: I1213 14:33:35.089674 1951 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:33:35.090890 kubelet[1951]: I1213 14:33:35.089789 1951 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:33:35.091362 kubelet[1951]: I1213 14:33:35.091342 1951 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:33:35.093000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.093000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:35.093000 audit[1951]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009b0c60 a1=c000b52450 a2=c0009b0c30 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.093000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:35.094404 kubelet[1951]: I1213 14:33:35.094377 1951 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:33:35.093000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.093000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:35.093000 audit[1951]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000996da0 a1=c000b52468 a2=c0009b0cf0 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.093000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:35.094742 kubelet[1951]: I1213 14:33:35.094724 1951 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:33:35.094931 kubelet[1951]: I1213 14:33:35.094918 1951 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:33:35.097790 kubelet[1951]: I1213 14:33:35.097748 1951 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:33:35.102735 kubelet[1951]: E1213 14:33:35.102685 1951 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:33:35.103314 kubelet[1951]: E1213 14:33:35.103211 1951 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.8.22\" not found" Dec 13 14:33:35.103314 kubelet[1951]: I1213 14:33:35.103272 1951 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:33:35.103609 kubelet[1951]: I1213 14:33:35.103589 1951 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:33:35.103681 kubelet[1951]: I1213 14:33:35.103671 1951 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:33:35.105000 audit[1966]: NETFILTER_CFG table=mangle:6 family=2 entries=2 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:35.105000 audit[1966]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff202345c0 a2=0 a3=7fff202345ac items=0 ppid=1951 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.106145 kubelet[1951]: I1213 14:33:35.106040 1951 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:33:35.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:33:35.108134 kubelet[1951]: I1213 14:33:35.108108 1951 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:33:35.108134 kubelet[1951]: I1213 14:33:35.108133 1951 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:33:35.107000 audit[1967]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:35.107000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffea611a3e0 a2=0 a3=7ffea611a3cc items=0 ppid=1951 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:33:35.111000 audit[1969]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:35.111000 audit[1969]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdca631780 a2=0 a3=7ffdca63176c items=0 ppid=1951 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:35.113000 audit[1971]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:35.113000 audit[1971]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd9c84db30 a2=0 a3=7ffd9c84db1c items=0 ppid=1951 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:35.133621 kubelet[1951]: E1213 14:33:35.133585 1951 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.22\" not found" node="10.200.8.22" Dec 13 14:33:35.135018 kubelet[1951]: I1213 14:33:35.134996 1951 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:33:35.135178 kubelet[1951]: I1213 14:33:35.135163 1951 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:33:35.134000 audit[1976]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:35.134000 audit[1976]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe26d73020 a2=0 a3=7ffe26d7300c items=0 ppid=1951 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:33:35.135493 kubelet[1951]: I1213 14:33:35.135253 1951 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:35.135614 kubelet[1951]: I1213 14:33:35.135500 1951 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:33:35.135000 audit[1977]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:35.135000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff405aac30 a2=0 a3=7fff405aac1c items=0 ppid=1951 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.135000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:33:35.136825 kubelet[1951]: I1213 14:33:35.136734 1951 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:33:35.136825 kubelet[1951]: I1213 14:33:35.136786 1951 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:33:35.136825 kubelet[1951]: I1213 14:33:35.136814 1951 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:33:35.136990 kubelet[1951]: E1213 14:33:35.136963 1951 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:33:35.137000 audit[1978]: NETFILTER_CFG table=mangle:12 family=2 entries=1 op=nft_register_chain pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:35.137000 audit[1978]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe446e81b0 a2=0 a3=7ffe446e819c items=0 ppid=1951 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:33:35.138000 audit[1979]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:35.138000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe89e38df0 a2=0 a3=7ffe89e38ddc items=0 ppid=1951 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:33:35.139000 audit[1980]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:35.139000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa34ce770 a2=0 a3=7fffa34ce75c items=0 ppid=1951 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:33:35.140000 audit[1981]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:35.140000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef2d97d60 a2=0 a3=7ffef2d97d4c items=0 ppid=1951 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:33:35.141000 audit[1982]: NETFILTER_CFG table=nat:16 family=10 entries=2 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:35.141000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd35ff5c00 a2=0 a3=7ffd35ff5bec items=0 ppid=1951 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:33:35.142706 kubelet[1951]: I1213 14:33:35.142684 1951 policy_none.go:49] "None policy: Start" Dec 13 14:33:35.142000 audit[1983]: NETFILTER_CFG table=filter:17 family=10 entries=2 op=nft_register_chain pid=1983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:35.142000 audit[1983]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd50cc13a0 a2=0 a3=7ffd50cc138c items=0 ppid=1951 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:33:35.144202 kubelet[1951]: I1213 14:33:35.144185 1951 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:33:35.144277 kubelet[1951]: I1213 14:33:35.144214 1951 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:33:35.153388 systemd[1]: Created slice kubepods.slice. Dec 13 14:33:35.158194 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:33:35.161718 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:33:35.167452 kubelet[1951]: I1213 14:33:35.167418 1951 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:33:35.166000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.166000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:35.166000 audit[1951]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a38510 a1=c000a509f0 a2=c000a384e0 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.166000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:35.170013 kubelet[1951]: I1213 14:33:35.168132 1951 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:33:35.170013 kubelet[1951]: I1213 14:33:35.168869 1951 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:33:35.170013 kubelet[1951]: I1213 14:33:35.168892 1951 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:33:35.175546 kubelet[1951]: E1213 14:33:35.175522 1951 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.22\" not found" Dec 13 14:33:35.175639 kubelet[1951]: I1213 14:33:35.175579 1951 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:33:35.273849 kubelet[1951]: I1213 14:33:35.270699 1951 kubelet_node_status.go:72] "Attempting to register node" node="10.200.8.22" Dec 13 14:33:35.287325 kubelet[1951]: I1213 14:33:35.287274 1951 kubelet_node_status.go:75] "Successfully registered node" node="10.200.8.22" Dec 13 14:33:35.408500 kubelet[1951]: I1213 14:33:35.408461 1951 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:33:35.409765 env[1431]: time="2024-12-13T14:33:35.409699651Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:33:35.410417 kubelet[1951]: I1213 14:33:35.410385 1951 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:33:35.419192 sudo[1821]: pam_unix(sudo:session): session closed for user root Dec 13 14:33:35.418000 audit[1821]: USER_END pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:35.418000 audit[1821]: CRED_DISP pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:35.535981 sshd[1809]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:35.537000 audit[1809]: USER_END pid=1809 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:35.538000 audit[1809]: CRED_DISP pid=1809 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:35.540529 systemd[1]: sshd@6-10.200.8.22:22-10.200.16.10:42392.service: Deactivated successfully. Dec 13 14:33:35.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.22:22-10.200.16.10:42392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:35.541641 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:33:35.542440 systemd-logind[1419]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:33:35.543357 systemd-logind[1419]: Removed session 9. Dec 13 14:33:36.010377 kubelet[1951]: I1213 14:33:36.010308 1951 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:33:36.011384 kubelet[1951]: W1213 14:33:36.010749 1951 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:33:36.011384 kubelet[1951]: W1213 14:33:36.011207 1951 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:33:36.011384 kubelet[1951]: W1213 14:33:36.011263 1951 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:33:36.061471 kubelet[1951]: E1213 14:33:36.061401 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:36.061757 kubelet[1951]: I1213 14:33:36.061423 1951 apiserver.go:52] "Watching apiserver" Dec 13 14:33:36.066519 kubelet[1951]: E1213 14:33:36.066460 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-krrcx" podUID="b926c6e1-0648-4a56-bd4d-00efdc540e40" Dec 13 14:33:36.073004 systemd[1]: Created slice kubepods-besteffort-pod1e7e1f0e_e1f4_4ac5_8b5d_c668d9c82561.slice. Dec 13 14:33:36.091429 systemd[1]: Created slice kubepods-besteffort-podf998296e_5afc_4fb7_9ec6_cdc94f5d19d8.slice. Dec 13 14:33:36.104131 kubelet[1951]: I1213 14:33:36.104078 1951 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:33:36.107431 kubelet[1951]: I1213 14:33:36.107385 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-xtables-lock\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.107431 kubelet[1951]: I1213 14:33:36.107435 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-var-run-calico\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.107695 kubelet[1951]: I1213 14:33:36.107465 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-policysync\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.107695 kubelet[1951]: I1213 14:33:36.107487 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-tigera-ca-bundle\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.107695 kubelet[1951]: I1213 14:33:36.107506 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-cni-net-dir\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.107695 kubelet[1951]: I1213 14:33:36.107528 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b926c6e1-0648-4a56-bd4d-00efdc540e40-varrun\") pod \"csi-node-driver-krrcx\" (UID: \"b926c6e1-0648-4a56-bd4d-00efdc540e40\") " pod="calico-system/csi-node-driver-krrcx" Dec 13 14:33:36.107695 kubelet[1951]: I1213 14:33:36.107550 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wdccc\" (UniqueName: \"kubernetes.io/projected/b926c6e1-0648-4a56-bd4d-00efdc540e40-kube-api-access-wdccc\") pod \"csi-node-driver-krrcx\" (UID: \"b926c6e1-0648-4a56-bd4d-00efdc540e40\") " pod="calico-system/csi-node-driver-krrcx" Dec 13 14:33:36.108076 kubelet[1951]: I1213 14:33:36.107572 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f998296e-5afc-4fb7-9ec6-cdc94f5d19d8-lib-modules\") pod \"kube-proxy-8bflx\" (UID: \"f998296e-5afc-4fb7-9ec6-cdc94f5d19d8\") " pod="kube-system/kube-proxy-8bflx" Dec 13 14:33:36.108076 kubelet[1951]: I1213 14:33:36.107596 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-cni-bin-dir\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.108076 kubelet[1951]: I1213 14:33:36.107614 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-cni-log-dir\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.108076 kubelet[1951]: I1213 14:33:36.107642 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b926c6e1-0648-4a56-bd4d-00efdc540e40-kubelet-dir\") pod \"csi-node-driver-krrcx\" (UID: \"b926c6e1-0648-4a56-bd4d-00efdc540e40\") " pod="calico-system/csi-node-driver-krrcx" Dec 13 14:33:36.108076 kubelet[1951]: I1213 14:33:36.107666 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f998296e-5afc-4fb7-9ec6-cdc94f5d19d8-xtables-lock\") pod \"kube-proxy-8bflx\" (UID: \"f998296e-5afc-4fb7-9ec6-cdc94f5d19d8\") " pod="kube-system/kube-proxy-8bflx" Dec 13 14:33:36.108260 kubelet[1951]: I1213 14:33:36.107690 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d97xf\" (UniqueName: \"kubernetes.io/projected/f998296e-5afc-4fb7-9ec6-cdc94f5d19d8-kube-api-access-d97xf\") pod \"kube-proxy-8bflx\" (UID: \"f998296e-5afc-4fb7-9ec6-cdc94f5d19d8\") " pod="kube-system/kube-proxy-8bflx" Dec 13 14:33:36.108260 kubelet[1951]: I1213 14:33:36.107715 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-lib-modules\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.108260 kubelet[1951]: I1213 14:33:36.107741 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-node-certs\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.108260 kubelet[1951]: I1213 14:33:36.107765 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-var-lib-calico\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.108260 kubelet[1951]: I1213 14:33:36.107803 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-flexvol-driver-host\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.108456 kubelet[1951]: I1213 14:33:36.107827 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2njvc\" (UniqueName: \"kubernetes.io/projected/1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561-kube-api-access-2njvc\") pod \"calico-node-s9wbs\" (UID: \"1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561\") " pod="calico-system/calico-node-s9wbs" Dec 13 14:33:36.108456 kubelet[1951]: I1213 14:33:36.107849 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b926c6e1-0648-4a56-bd4d-00efdc540e40-socket-dir\") pod \"csi-node-driver-krrcx\" (UID: \"b926c6e1-0648-4a56-bd4d-00efdc540e40\") " pod="calico-system/csi-node-driver-krrcx" Dec 13 14:33:36.108456 kubelet[1951]: I1213 14:33:36.107868 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b926c6e1-0648-4a56-bd4d-00efdc540e40-registration-dir\") pod \"csi-node-driver-krrcx\" (UID: \"b926c6e1-0648-4a56-bd4d-00efdc540e40\") " pod="calico-system/csi-node-driver-krrcx" Dec 13 14:33:36.108456 kubelet[1951]: I1213 14:33:36.107891 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f998296e-5afc-4fb7-9ec6-cdc94f5d19d8-kube-proxy\") pod \"kube-proxy-8bflx\" (UID: \"f998296e-5afc-4fb7-9ec6-cdc94f5d19d8\") " pod="kube-system/kube-proxy-8bflx" Dec 13 14:33:36.210057 kubelet[1951]: I1213 14:33:36.209973 1951 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:33:36.212417 kubelet[1951]: E1213 14:33:36.212385 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.212672 kubelet[1951]: W1213 14:33:36.212645 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.212834 kubelet[1951]: E1213 14:33:36.212817 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.213203 kubelet[1951]: E1213 14:33:36.213188 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.213301 kubelet[1951]: W1213 14:33:36.213290 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.213472 kubelet[1951]: E1213 14:33:36.213458 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.213702 kubelet[1951]: E1213 14:33:36.213683 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.213807 kubelet[1951]: W1213 14:33:36.213795 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.213986 kubelet[1951]: E1213 14:33:36.213973 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.214229 kubelet[1951]: E1213 14:33:36.214209 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.214323 kubelet[1951]: W1213 14:33:36.214310 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.214501 kubelet[1951]: E1213 14:33:36.214487 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.221579 kubelet[1951]: E1213 14:33:36.221544 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.221827 kubelet[1951]: W1213 14:33:36.221805 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.229828 kubelet[1951]: E1213 14:33:36.229392 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.229828 kubelet[1951]: W1213 14:33:36.229437 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.230287 kubelet[1951]: E1213 14:33:36.230267 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.230287 kubelet[1951]: W1213 14:33:36.230286 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.230499 kubelet[1951]: E1213 14:33:36.230483 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.230579 kubelet[1951]: W1213 14:33:36.230500 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.230698 kubelet[1951]: E1213 14:33:36.230682 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.230783 kubelet[1951]: W1213 14:33:36.230698 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.230894 kubelet[1951]: E1213 14:33:36.230879 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.230970 kubelet[1951]: W1213 14:33:36.230895 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.231080 kubelet[1951]: E1213 14:33:36.231065 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.231150 kubelet[1951]: W1213 14:33:36.231080 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.231265 kubelet[1951]: E1213 14:33:36.231250 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.231336 kubelet[1951]: W1213 14:33:36.231267 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.231455 kubelet[1951]: E1213 14:33:36.231441 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.231525 kubelet[1951]: W1213 14:33:36.231456 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.231638 kubelet[1951]: E1213 14:33:36.231622 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.231638 kubelet[1951]: W1213 14:33:36.231636 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.231737 kubelet[1951]: E1213 14:33:36.231658 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.231801 kubelet[1951]: E1213 14:33:36.231744 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.231990 kubelet[1951]: E1213 14:33:36.231974 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.232065 kubelet[1951]: W1213 14:33:36.231991 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.232065 kubelet[1951]: E1213 14:33:36.232007 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.232198 kubelet[1951]: E1213 14:33:36.232183 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.232246 kubelet[1951]: W1213 14:33:36.232198 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.232246 kubelet[1951]: E1213 14:33:36.232212 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.237551 kubelet[1951]: E1213 14:33:36.236762 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.237551 kubelet[1951]: W1213 14:33:36.236999 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.237551 kubelet[1951]: E1213 14:33:36.237024 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.237881 kubelet[1951]: E1213 14:33:36.237573 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.237881 kubelet[1951]: E1213 14:33:36.237833 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.237881 kubelet[1951]: W1213 14:33:36.237849 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.237881 kubelet[1951]: E1213 14:33:36.237866 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.238077 kubelet[1951]: E1213 14:33:36.238044 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.238077 kubelet[1951]: W1213 14:33:36.238055 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.238077 kubelet[1951]: E1213 14:33:36.238067 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.238325 kubelet[1951]: E1213 14:33:36.238306 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.238325 kubelet[1951]: W1213 14:33:36.238324 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.238453 kubelet[1951]: E1213 14:33:36.238336 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.238453 kubelet[1951]: E1213 14:33:36.238376 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.238568 kubelet[1951]: E1213 14:33:36.238553 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.238621 kubelet[1951]: W1213 14:33:36.238570 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.238621 kubelet[1951]: E1213 14:33:36.238583 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.238759 kubelet[1951]: E1213 14:33:36.238745 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.238832 kubelet[1951]: W1213 14:33:36.238760 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.238832 kubelet[1951]: E1213 14:33:36.238788 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.239361 kubelet[1951]: E1213 14:33:36.239333 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.239475 kubelet[1951]: E1213 14:33:36.239462 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.239557 kubelet[1951]: E1213 14:33:36.239545 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.239701 kubelet[1951]: E1213 14:33:36.239684 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.239834 kubelet[1951]: E1213 14:33:36.239819 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.239917 kubelet[1951]: E1213 14:33:36.239905 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.239978 kubelet[1951]: E1213 14:33:36.239923 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.240548 kubelet[1951]: W1213 14:33:36.240402 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.240548 kubelet[1951]: E1213 14:33:36.240428 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.241138 kubelet[1951]: E1213 14:33:36.241123 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.241244 kubelet[1951]: W1213 14:33:36.241230 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.241344 kubelet[1951]: E1213 14:33:36.241315 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.241569 kubelet[1951]: E1213 14:33:36.241556 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.241653 kubelet[1951]: W1213 14:33:36.241642 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.241821 kubelet[1951]: E1213 14:33:36.241799 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.242029 kubelet[1951]: E1213 14:33:36.242013 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.242029 kubelet[1951]: W1213 14:33:36.242026 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.242199 kubelet[1951]: E1213 14:33:36.242171 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.242330 kubelet[1951]: E1213 14:33:36.242313 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.242330 kubelet[1951]: W1213 14:33:36.242325 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.242483 kubelet[1951]: E1213 14:33:36.242469 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.242584 kubelet[1951]: E1213 14:33:36.242528 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.242747 kubelet[1951]: W1213 14:33:36.242584 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.242747 kubelet[1951]: E1213 14:33:36.242676 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.243016 kubelet[1951]: E1213 14:33:36.243004 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.243103 kubelet[1951]: W1213 14:33:36.243092 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.243358 kubelet[1951]: E1213 14:33:36.243346 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.243430 kubelet[1951]: W1213 14:33:36.243376 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.243636 kubelet[1951]: E1213 14:33:36.243625 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.243724 kubelet[1951]: W1213 14:33:36.243712 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.244016 kubelet[1951]: E1213 14:33:36.244003 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.244116 kubelet[1951]: W1213 14:33:36.244102 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.244386 kubelet[1951]: E1213 14:33:36.244373 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.244483 kubelet[1951]: W1213 14:33:36.244468 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.244565 kubelet[1951]: E1213 14:33:36.244553 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.244896 kubelet[1951]: E1213 14:33:36.244884 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.244989 kubelet[1951]: W1213 14:33:36.244978 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.245058 kubelet[1951]: E1213 14:33:36.245047 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.246256 kubelet[1951]: E1213 14:33:36.246241 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.246360 kubelet[1951]: W1213 14:33:36.246345 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.246444 kubelet[1951]: E1213 14:33:36.246429 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.246526 kubelet[1951]: E1213 14:33:36.246515 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.246866 kubelet[1951]: E1213 14:33:36.246852 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.246964 kubelet[1951]: W1213 14:33:36.246952 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.247044 kubelet[1951]: E1213 14:33:36.247031 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.247124 kubelet[1951]: E1213 14:33:36.247114 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.252605 kubelet[1951]: E1213 14:33:36.251755 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.252605 kubelet[1951]: E1213 14:33:36.251815 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.252916 kubelet[1951]: E1213 14:33:36.252901 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.253020 kubelet[1951]: W1213 14:33:36.253006 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.253098 kubelet[1951]: E1213 14:33:36.253086 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.253311 kubelet[1951]: E1213 14:33:36.253300 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.253391 kubelet[1951]: W1213 14:33:36.253355 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.253391 kubelet[1951]: E1213 14:33:36.253376 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.392839 env[1431]: time="2024-12-13T14:33:36.390936860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s9wbs,Uid:1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:36.396380 env[1431]: time="2024-12-13T14:33:36.396335264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8bflx,Uid:f998296e-5afc-4fb7-9ec6-cdc94f5d19d8,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:37.061599 kubelet[1951]: E1213 14:33:37.061554 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:37.114845 env[1431]: time="2024-12-13T14:33:37.114759658Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:37.120386 env[1431]: time="2024-12-13T14:33:37.120331962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:37.125179 env[1431]: time="2024-12-13T14:33:37.125125665Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:37.131289 env[1431]: time="2024-12-13T14:33:37.131242469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:37.134571 env[1431]: time="2024-12-13T14:33:37.134528271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:37.139025 env[1431]: time="2024-12-13T14:33:37.138985774Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:37.143242 env[1431]: time="2024-12-13T14:33:37.143202277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:37.152087 env[1431]: time="2024-12-13T14:33:37.152049983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:37.202037 env[1431]: time="2024-12-13T14:33:37.201121415Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:37.202037 env[1431]: time="2024-12-13T14:33:37.201192715Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:37.202037 env[1431]: time="2024-12-13T14:33:37.201210015Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:37.203027 env[1431]: time="2024-12-13T14:33:37.202959916Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/92526bb75ef886c661f06ecba35b58741a433f00e373c04068ad0b9dd0d9567e pid=2037 runtime=io.containerd.runc.v2 Dec 13 14:33:37.212075 env[1431]: time="2024-12-13T14:33:37.211996522Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:37.212304 env[1431]: time="2024-12-13T14:33:37.212046422Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:37.212304 env[1431]: time="2024-12-13T14:33:37.212060022Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:37.212304 env[1431]: time="2024-12-13T14:33:37.212244622Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd pid=2057 runtime=io.containerd.runc.v2 Dec 13 14:33:37.220938 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3343359016.mount: Deactivated successfully. Dec 13 14:33:37.235898 systemd[1]: Started cri-containerd-92526bb75ef886c661f06ecba35b58741a433f00e373c04068ad0b9dd0d9567e.scope. Dec 13 14:33:37.245584 systemd[1]: run-containerd-runc-k8s.io-92526bb75ef886c661f06ecba35b58741a433f00e373c04068ad0b9dd0d9567e-runc.0uXfAp.mount: Deactivated successfully. Dec 13 14:33:37.264882 systemd[1]: run-containerd-runc-k8s.io-6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd-runc.e9s7Rj.mount: Deactivated successfully. Dec 13 14:33:37.269548 systemd[1]: Started cri-containerd-6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd.scope. Dec 13 14:33:37.299892 kernel: kauditd_printk_skb: 246 callbacks suppressed Dec 13 14:33:37.300099 kernel: audit: type=1400 audit(1734100417.285:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.316591 env[1431]: time="2024-12-13T14:33:37.316280490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8bflx,Uid:f998296e-5afc-4fb7-9ec6-cdc94f5d19d8,Namespace:kube-system,Attempt:0,} returns sandbox id \"92526bb75ef886c661f06ecba35b58741a433f00e373c04068ad0b9dd0d9567e\"" Dec 13 14:33:37.318694 kernel: audit: type=1400 audit(1734100417.285:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.330679 env[1431]: time="2024-12-13T14:33:37.322728894Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:33:37.330883 kernel: audit: type=1400 audit(1734100417.285:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.330929 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:33:37.345930 kernel: audit: type=1400 audit(1734100417.285:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.346140 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:33:37.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.363667 kernel: audit: type=1400 audit(1734100417.285:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.363867 kernel: audit: backlog limit exceeded Dec 13 14:33:37.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.379547 kernel: audit: type=1400 audit(1734100417.285:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.299000 audit: BPF prog-id=56 op=LOAD Dec 13 14:33:37.299000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.299000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2037 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353236626237356566383836633636316630366563626133356235 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2037 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353236626237356566383836633636316630366563626133356235 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.385827 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit: BPF prog-id=57 op=LOAD Dec 13 14:33:37.300000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d5430 items=0 ppid=2037 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353236626237356566383836633636316630366563626133356235 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit: BPF prog-id=58 op=LOAD Dec 13 14:33:37.300000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d5478 items=0 ppid=2037 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353236626237356566383836633636316630366563626133356235 Dec 13 14:33:37.300000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:33:37.300000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.300000 audit: BPF prog-id=59 op=LOAD Dec 13 14:33:37.300000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d5888 items=0 ppid=2037 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353236626237356566383836633636316630366563626133356235 Dec 13 14:33:37.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.379000 audit: BPF prog-id=60 op=LOAD Dec 13 14:33:37.386000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.386000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2057 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634313866393162383664386161346431333538376564313565373930 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit: BPF prog-id=61 op=LOAD Dec 13 14:33:37.387000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000187df0 items=0 ppid=2057 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634313866393162383664386161346431333538376564313565373930 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit: BPF prog-id=62 op=LOAD Dec 13 14:33:37.387000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000187e38 items=0 ppid=2057 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634313866393162383664386161346431333538376564313565373930 Dec 13 14:33:37.387000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:33:37.387000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.387000 audit: BPF prog-id=63 op=LOAD Dec 13 14:33:37.387000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c4248 items=0 ppid=2057 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634313866393162383664386161346431333538376564313565373930 Dec 13 14:33:37.408028 env[1431]: time="2024-12-13T14:33:37.407959749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s9wbs,Uid:1e7e1f0e-e1f4-4ac5-8b5d-c668d9c82561,Namespace:calico-system,Attempt:0,} returns sandbox id \"6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd\"" Dec 13 14:33:38.062518 kubelet[1951]: E1213 14:33:38.062463 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:38.138813 kubelet[1951]: E1213 14:33:38.138182 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-krrcx" podUID="b926c6e1-0648-4a56-bd4d-00efdc540e40" Dec 13 14:33:38.528262 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3885323184.mount: Deactivated successfully. Dec 13 14:33:39.063201 kubelet[1951]: E1213 14:33:39.063125 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:39.219573 env[1431]: time="2024-12-13T14:33:39.219475071Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:39.224659 env[1431]: time="2024-12-13T14:33:39.224601074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:39.228840 env[1431]: time="2024-12-13T14:33:39.228751476Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:39.234016 env[1431]: time="2024-12-13T14:33:39.233954979Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:39.234448 env[1431]: time="2024-12-13T14:33:39.234411580Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:33:39.236592 env[1431]: time="2024-12-13T14:33:39.236553381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:33:39.237844 env[1431]: time="2024-12-13T14:33:39.237805381Z" level=info msg="CreateContainer within sandbox \"92526bb75ef886c661f06ecba35b58741a433f00e373c04068ad0b9dd0d9567e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:33:39.291235 env[1431]: time="2024-12-13T14:33:39.291162212Z" level=info msg="CreateContainer within sandbox \"92526bb75ef886c661f06ecba35b58741a433f00e373c04068ad0b9dd0d9567e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"792d7cd0af297402d485579d88ef14a162a407c7b1490f6908073ab37cea71cd\"" Dec 13 14:33:39.292583 env[1431]: time="2024-12-13T14:33:39.292542813Z" level=info msg="StartContainer for \"792d7cd0af297402d485579d88ef14a162a407c7b1490f6908073ab37cea71cd\"" Dec 13 14:33:39.326887 systemd[1]: Started cri-containerd-792d7cd0af297402d485579d88ef14a162a407c7b1490f6908073ab37cea71cd.scope. Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f176d877d58 items=0 ppid=2037 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326437636430616632393734303264343835353739643838656631 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.348000 audit: BPF prog-id=64 op=LOAD Dec 13 14:33:39.348000 audit[2120]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038fc58 items=0 ppid=2037 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326437636430616632393734303264343835353739643838656631 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit: BPF prog-id=65 op=LOAD Dec 13 14:33:39.349000 audit[2120]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038fca8 items=0 ppid=2037 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326437636430616632393734303264343835353739643838656631 Dec 13 14:33:39.349000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:33:39.349000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.349000 audit: BPF prog-id=66 op=LOAD Dec 13 14:33:39.349000 audit[2120]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038fd38 items=0 ppid=2037 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326437636430616632393734303264343835353739643838656631 Dec 13 14:33:39.376834 env[1431]: time="2024-12-13T14:33:39.376739261Z" level=info msg="StartContainer for \"792d7cd0af297402d485579d88ef14a162a407c7b1490f6908073ab37cea71cd\" returns successfully" Dec 13 14:33:39.555000 audit[2178]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:39.555000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8caba040 a2=0 a3=7ffd8caba02c items=0 ppid=2131 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:33:39.557000 audit[2179]: NETFILTER_CFG table=nat:19 family=10 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:39.557000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcf82db50 a2=0 a3=7ffdcf82db3c items=0 ppid=2131 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:33:39.560000 audit[2180]: NETFILTER_CFG table=filter:20 family=10 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:39.560000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd31f3c80 a2=0 a3=7ffdd31f3c6c items=0 ppid=2131 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:33:39.561000 audit[2181]: NETFILTER_CFG table=mangle:21 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.561000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5dcf5780 a2=0 a3=7ffc5dcf576c items=0 ppid=2131 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:33:39.562000 audit[2182]: NETFILTER_CFG table=nat:22 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.562000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd0ee32d0 a2=0 a3=7ffdd0ee32bc items=0 ppid=2131 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:33:39.563000 audit[2183]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.563000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe76810d50 a2=0 a3=7ffe76810d3c items=0 ppid=2131 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:33:39.660000 audit[2184]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.660000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffefcf32b70 a2=0 a3=7ffefcf32b5c items=0 ppid=2131 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:33:39.665000 audit[2186]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.665000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd3632c490 a2=0 a3=7ffd3632c47c items=0 ppid=2131 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:33:39.669000 audit[2189]: NETFILTER_CFG table=filter:26 family=2 entries=2 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.669000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc9b1e2b30 a2=0 a3=7ffc9b1e2b1c items=0 ppid=2131 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:33:39.670000 audit[2190]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.670000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdc8aea20 a2=0 a3=7fffdc8aea0c items=0 ppid=2131 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:33:39.673000 audit[2192]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.673000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd67d11950 a2=0 a3=7ffd67d1193c items=0 ppid=2131 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:33:39.674000 audit[2193]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.674000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb7e99df0 a2=0 a3=7ffeb7e99ddc items=0 ppid=2131 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:33:39.677000 audit[2195]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.677000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff0d96d70 a2=0 a3=7ffff0d96d5c items=0 ppid=2131 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:33:39.680000 audit[2198]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.680000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe7f8f4f70 a2=0 a3=7ffe7f8f4f5c items=0 ppid=2131 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:33:39.682000 audit[2199]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.682000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc633f5f30 a2=0 a3=7ffc633f5f1c items=0 ppid=2131 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:33:39.684000 audit[2201]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.684000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff496c09a0 a2=0 a3=7fff496c098c items=0 ppid=2131 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:33:39.686000 audit[2202]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.686000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1fd85680 a2=0 a3=7ffd1fd8566c items=0 ppid=2131 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:33:39.688000 audit[2204]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.688000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd29872e40 a2=0 a3=7ffd29872e2c items=0 ppid=2131 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:33:39.692000 audit[2207]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.692000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc4b65330 a2=0 a3=7ffdc4b6531c items=0 ppid=2131 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:33:39.696000 audit[2210]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.696000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1b068680 a2=0 a3=7ffe1b06866c items=0 ppid=2131 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:33:39.698000 audit[2211]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.698000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffece2a5c00 a2=0 a3=7ffece2a5bec items=0 ppid=2131 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:33:39.700000 audit[2213]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.700000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd758e6d90 a2=0 a3=7ffd758e6d7c items=0 ppid=2131 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:33:39.731000 audit[2217]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.731000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdb816c300 a2=0 a3=7ffdb816c2ec items=0 ppid=2131 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:33:39.733000 audit[2218]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.733000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce2cf4630 a2=0 a3=7ffce2cf461c items=0 ppid=2131 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:33:39.737000 audit[2220]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:39.737000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdf8d188d0 a2=0 a3=7ffdf8d188bc items=0 ppid=2131 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:33:39.867000 audit[2226]: NETFILTER_CFG table=filter:43 family=2 entries=5 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:39.867000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcb6ba59c0 a2=0 a3=7ffcb6ba59ac items=0 ppid=2131 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:40.006000 audit[2226]: NETFILTER_CFG table=nat:44 family=2 entries=65 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:40.006000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffcb6ba59c0 a2=0 a3=7ffcb6ba59ac items=0 ppid=2131 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:40.026000 audit[2235]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.026000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcb6e573c0 a2=0 a3=7ffcb6e573ac items=0 ppid=2131 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:33:40.029000 audit[2237]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.029000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1d864de0 a2=0 a3=7ffd1d864dcc items=0 ppid=2131 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:33:40.034000 audit[2240]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.034000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe80f6a120 a2=0 a3=7ffe80f6a10c items=0 ppid=2131 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:33:40.036000 audit[2241]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.036000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa0660c20 a2=0 a3=7fffa0660c0c items=0 ppid=2131 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:33:40.038000 audit[2243]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.038000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd54b49e0 a2=0 a3=7fffd54b49cc items=0 ppid=2131 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:33:40.040000 audit[2244]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.040000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4f94ca80 a2=0 a3=7ffe4f94ca6c items=0 ppid=2131 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:33:40.042000 audit[2246]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.042000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffc9a50ee0 a2=0 a3=7fffc9a50ecc items=0 ppid=2131 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:33:40.046000 audit[2249]: NETFILTER_CFG table=filter:52 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.046000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff8f686ae0 a2=0 a3=7fff8f686acc items=0 ppid=2131 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:33:40.048000 audit[2250]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.048000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef236e3f0 a2=0 a3=7ffef236e3dc items=0 ppid=2131 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:33:40.051000 audit[2252]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.051000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd8708a620 a2=0 a3=7ffd8708a60c items=0 ppid=2131 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:33:40.052000 audit[2253]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.052000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb1995df0 a2=0 a3=7ffeb1995ddc items=0 ppid=2131 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:33:40.054000 audit[2255]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.054000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5a5e19f0 a2=0 a3=7fff5a5e19dc items=0 ppid=2131 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:33:40.058000 audit[2258]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.058000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeae0a7960 a2=0 a3=7ffeae0a794c items=0 ppid=2131 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:33:40.063640 kubelet[1951]: E1213 14:33:40.063595 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:40.063000 audit[2261]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.063000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc26545b60 a2=0 a3=7ffc26545b4c items=0 ppid=2131 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:33:40.065000 audit[2262]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.065000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea8564e10 a2=0 a3=7ffea8564dfc items=0 ppid=2131 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:33:40.067000 audit[2264]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.067000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdc333ece0 a2=0 a3=7ffdc333eccc items=0 ppid=2131 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:33:40.072000 audit[2267]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.072000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd9399cc90 a2=0 a3=7ffd9399cc7c items=0 ppid=2131 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:33:40.073000 audit[2268]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.073000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1b90c140 a2=0 a3=7ffe1b90c12c items=0 ppid=2131 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:33:40.075000 audit[2270]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.075000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc7d960530 a2=0 a3=7ffc7d96051c items=0 ppid=2131 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:33:40.077000 audit[2271]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.077000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8adf3120 a2=0 a3=7ffe8adf310c items=0 ppid=2131 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:33:40.079000 audit[2273]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.079000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe28a019a0 a2=0 a3=7ffe28a0198c items=0 ppid=2131 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:40.083000 audit[2276]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:40.083000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff486ede30 a2=0 a3=7fff486ede1c items=0 ppid=2131 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:40.086000 audit[2278]: NETFILTER_CFG table=filter:67 family=10 entries=3 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:33:40.086000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd792d8680 a2=0 a3=7ffd792d866c items=0 ppid=2131 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.086000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:40.086000 audit[2278]: NETFILTER_CFG table=nat:68 family=10 entries=7 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:33:40.086000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd792d8680 a2=0 a3=7ffd792d866c items=0 ppid=2131 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.086000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:40.138229 kubelet[1951]: E1213 14:33:40.138148 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-krrcx" podUID="b926c6e1-0648-4a56-bd4d-00efdc540e40" Dec 13 14:33:40.168094 kubelet[1951]: I1213 14:33:40.168011 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8bflx" podStartSLOduration=3.254144121 podStartE2EDuration="5.167991908s" podCreationTimestamp="2024-12-13 14:33:35 +0000 UTC" firstStartedPulling="2024-12-13 14:33:37.321943193 +0000 UTC m=+3.462623155" lastFinishedPulling="2024-12-13 14:33:39.23579098 +0000 UTC m=+5.376470942" observedRunningTime="2024-12-13 14:33:40.167868708 +0000 UTC m=+6.308548570" watchObservedRunningTime="2024-12-13 14:33:40.167991908 +0000 UTC m=+6.308671870" Dec 13 14:33:40.238682 kubelet[1951]: E1213 14:33:40.238631 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.238682 kubelet[1951]: W1213 14:33:40.238667 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.239064 kubelet[1951]: E1213 14:33:40.238706 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.239064 kubelet[1951]: E1213 14:33:40.239039 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.239064 kubelet[1951]: W1213 14:33:40.239054 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.239272 kubelet[1951]: E1213 14:33:40.239071 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.239331 kubelet[1951]: E1213 14:33:40.239287 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.239331 kubelet[1951]: W1213 14:33:40.239303 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.239331 kubelet[1951]: E1213 14:33:40.239319 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.239549 kubelet[1951]: E1213 14:33:40.239526 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.239549 kubelet[1951]: W1213 14:33:40.239546 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.239681 kubelet[1951]: E1213 14:33:40.239562 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.239837 kubelet[1951]: E1213 14:33:40.239816 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.239837 kubelet[1951]: W1213 14:33:40.239833 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.239977 kubelet[1951]: E1213 14:33:40.239849 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.240086 kubelet[1951]: E1213 14:33:40.240064 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.240086 kubelet[1951]: W1213 14:33:40.240081 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.240231 kubelet[1951]: E1213 14:33:40.240097 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.240329 kubelet[1951]: E1213 14:33:40.240309 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.240329 kubelet[1951]: W1213 14:33:40.240325 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.240471 kubelet[1951]: E1213 14:33:40.240340 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.240571 kubelet[1951]: E1213 14:33:40.240550 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.240571 kubelet[1951]: W1213 14:33:40.240566 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.240689 kubelet[1951]: E1213 14:33:40.240582 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.240856 kubelet[1951]: E1213 14:33:40.240833 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.240856 kubelet[1951]: W1213 14:33:40.240850 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.241012 kubelet[1951]: E1213 14:33:40.240867 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.241100 kubelet[1951]: E1213 14:33:40.241080 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.241100 kubelet[1951]: W1213 14:33:40.241097 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.241225 kubelet[1951]: E1213 14:33:40.241116 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.241349 kubelet[1951]: E1213 14:33:40.241333 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.241349 kubelet[1951]: W1213 14:33:40.241347 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.241476 kubelet[1951]: E1213 14:33:40.241364 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.241597 kubelet[1951]: E1213 14:33:40.241577 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.241597 kubelet[1951]: W1213 14:33:40.241593 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.241719 kubelet[1951]: E1213 14:33:40.241607 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.241903 kubelet[1951]: E1213 14:33:40.241881 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.241903 kubelet[1951]: W1213 14:33:40.241898 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.242078 kubelet[1951]: E1213 14:33:40.241915 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.242192 kubelet[1951]: E1213 14:33:40.242169 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.242192 kubelet[1951]: W1213 14:33:40.242187 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.242317 kubelet[1951]: E1213 14:33:40.242203 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.242449 kubelet[1951]: E1213 14:33:40.242430 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.242449 kubelet[1951]: W1213 14:33:40.242446 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.242598 kubelet[1951]: E1213 14:33:40.242462 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.242706 kubelet[1951]: E1213 14:33:40.242685 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.242706 kubelet[1951]: W1213 14:33:40.242702 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.242885 kubelet[1951]: E1213 14:33:40.242718 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.242999 kubelet[1951]: E1213 14:33:40.242982 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.242999 kubelet[1951]: W1213 14:33:40.242997 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.243119 kubelet[1951]: E1213 14:33:40.243013 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.243243 kubelet[1951]: E1213 14:33:40.243224 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.243243 kubelet[1951]: W1213 14:33:40.243240 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.243381 kubelet[1951]: E1213 14:33:40.243254 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.243488 kubelet[1951]: E1213 14:33:40.243472 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.243488 kubelet[1951]: W1213 14:33:40.243485 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.243600 kubelet[1951]: E1213 14:33:40.243501 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.243743 kubelet[1951]: E1213 14:33:40.243726 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.243743 kubelet[1951]: W1213 14:33:40.243741 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.243897 kubelet[1951]: E1213 14:33:40.243756 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.261604 systemd[1]: run-containerd-runc-k8s.io-792d7cd0af297402d485579d88ef14a162a407c7b1490f6908073ab37cea71cd-runc.Q3wUzV.mount: Deactivated successfully. Dec 13 14:33:40.340517 kubelet[1951]: E1213 14:33:40.338815 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.340517 kubelet[1951]: W1213 14:33:40.338852 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.340517 kubelet[1951]: E1213 14:33:40.338885 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.340517 kubelet[1951]: E1213 14:33:40.339198 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.340517 kubelet[1951]: W1213 14:33:40.339208 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.340517 kubelet[1951]: E1213 14:33:40.339226 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.340517 kubelet[1951]: E1213 14:33:40.339436 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.340517 kubelet[1951]: W1213 14:33:40.339445 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.340517 kubelet[1951]: E1213 14:33:40.339459 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.340517 kubelet[1951]: E1213 14:33:40.339655 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.341130 kubelet[1951]: W1213 14:33:40.339664 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.341130 kubelet[1951]: E1213 14:33:40.339678 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.341130 kubelet[1951]: E1213 14:33:40.339866 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.341130 kubelet[1951]: W1213 14:33:40.339875 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.341130 kubelet[1951]: E1213 14:33:40.339888 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.341130 kubelet[1951]: E1213 14:33:40.340127 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.341130 kubelet[1951]: W1213 14:33:40.340136 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.341130 kubelet[1951]: E1213 14:33:40.340153 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.342183 kubelet[1951]: E1213 14:33:40.341693 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.342183 kubelet[1951]: W1213 14:33:40.341716 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.342183 kubelet[1951]: E1213 14:33:40.341865 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.342183 kubelet[1951]: E1213 14:33:40.342050 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.342183 kubelet[1951]: W1213 14:33:40.342061 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.342183 kubelet[1951]: E1213 14:33:40.342077 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.342918 kubelet[1951]: E1213 14:33:40.342702 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.342918 kubelet[1951]: W1213 14:33:40.342718 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.342918 kubelet[1951]: E1213 14:33:40.342735 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.343298 kubelet[1951]: E1213 14:33:40.343157 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.343298 kubelet[1951]: W1213 14:33:40.343170 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.343298 kubelet[1951]: E1213 14:33:40.343183 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.343588 kubelet[1951]: E1213 14:33:40.343577 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.343665 kubelet[1951]: W1213 14:33:40.343655 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.344131 kubelet[1951]: E1213 14:33:40.343729 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.344443 kubelet[1951]: E1213 14:33:40.344431 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:40.344527 kubelet[1951]: W1213 14:33:40.344517 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:40.344602 kubelet[1951]: E1213 14:33:40.344589 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:40.451912 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount57484314.mount: Deactivated successfully. Dec 13 14:33:40.638440 env[1431]: time="2024-12-13T14:33:40.636969954Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:40.647789 env[1431]: time="2024-12-13T14:33:40.647712591Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:40.652911 env[1431]: time="2024-12-13T14:33:40.652858509Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:40.656904 env[1431]: time="2024-12-13T14:33:40.656851123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:40.657479 env[1431]: time="2024-12-13T14:33:40.657431825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:33:40.660322 env[1431]: time="2024-12-13T14:33:40.660284435Z" level=info msg="CreateContainer within sandbox \"6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:33:40.702398 env[1431]: time="2024-12-13T14:33:40.702330583Z" level=info msg="CreateContainer within sandbox \"6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fd629278b3de1eef22953d903bd4d1626e39a4e5e7b586e619b0d2d794b36102\"" Dec 13 14:33:40.703416 env[1431]: time="2024-12-13T14:33:40.703364987Z" level=info msg="StartContainer for \"fd629278b3de1eef22953d903bd4d1626e39a4e5e7b586e619b0d2d794b36102\"" Dec 13 14:33:40.728336 systemd[1]: Started cri-containerd-fd629278b3de1eef22953d903bd4d1626e39a4e5e7b586e619b0d2d794b36102.scope. Dec 13 14:33:40.749000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.749000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f57a8c87c28 items=0 ppid=2057 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664363239323738623364653165656632323935336439303362643464 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.750000 audit: BPF prog-id=67 op=LOAD Dec 13 14:33:40.750000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001bec48 items=0 ppid=2057 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664363239323738623364653165656632323935336439303362643464 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit: BPF prog-id=68 op=LOAD Dec 13 14:33:40.751000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001bec98 items=0 ppid=2057 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664363239323738623364653165656632323935336439303362643464 Dec 13 14:33:40.751000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:33:40.751000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.751000 audit: BPF prog-id=69 op=LOAD Dec 13 14:33:40.751000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001bed28 items=0 ppid=2057 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664363239323738623364653165656632323935336439303362643464 Dec 13 14:33:40.777928 env[1431]: time="2024-12-13T14:33:40.777847649Z" level=info msg="StartContainer for \"fd629278b3de1eef22953d903bd4d1626e39a4e5e7b586e619b0d2d794b36102\" returns successfully" Dec 13 14:33:40.787616 systemd[1]: cri-containerd-fd629278b3de1eef22953d903bd4d1626e39a4e5e7b586e619b0d2d794b36102.scope: Deactivated successfully. Dec 13 14:33:40.790000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:33:41.064805 kubelet[1951]: E1213 14:33:41.064725 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:41.262097 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fd629278b3de1eef22953d903bd4d1626e39a4e5e7b586e619b0d2d794b36102-rootfs.mount: Deactivated successfully. Dec 13 14:33:41.769727 env[1431]: time="2024-12-13T14:33:41.769655434Z" level=info msg="shim disconnected" id=fd629278b3de1eef22953d903bd4d1626e39a4e5e7b586e619b0d2d794b36102 Dec 13 14:33:41.769727 env[1431]: time="2024-12-13T14:33:41.769735936Z" level=warning msg="cleaning up after shim disconnected" id=fd629278b3de1eef22953d903bd4d1626e39a4e5e7b586e619b0d2d794b36102 namespace=k8s.io Dec 13 14:33:41.769727 env[1431]: time="2024-12-13T14:33:41.769750136Z" level=info msg="cleaning up dead shim" Dec 13 14:33:41.780743 env[1431]: time="2024-12-13T14:33:41.780677629Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:33:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2360 runtime=io.containerd.runc.v2\n" Dec 13 14:33:42.065098 kubelet[1951]: E1213 14:33:42.064912 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:42.138416 kubelet[1951]: E1213 14:33:42.137899 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-krrcx" podUID="b926c6e1-0648-4a56-bd4d-00efdc540e40" Dec 13 14:33:42.706363 env[1431]: time="2024-12-13T14:33:42.706302713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:33:43.066169 kubelet[1951]: E1213 14:33:43.066009 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:44.066459 kubelet[1951]: E1213 14:33:44.066325 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:44.137709 kubelet[1951]: E1213 14:33:44.137634 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-krrcx" podUID="b926c6e1-0648-4a56-bd4d-00efdc540e40" Dec 13 14:33:45.066927 kubelet[1951]: E1213 14:33:45.066844 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:46.067439 kubelet[1951]: E1213 14:33:46.067368 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:46.138310 kubelet[1951]: E1213 14:33:46.138219 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-krrcx" podUID="b926c6e1-0648-4a56-bd4d-00efdc540e40" Dec 13 14:33:47.059651 env[1431]: time="2024-12-13T14:33:47.059570141Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:47.068192 kubelet[1951]: E1213 14:33:47.068131 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:47.069065 env[1431]: time="2024-12-13T14:33:47.069008155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:47.073655 env[1431]: time="2024-12-13T14:33:47.073591659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:47.083515 env[1431]: time="2024-12-13T14:33:47.083437582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:47.084263 env[1431]: time="2024-12-13T14:33:47.084222300Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:33:47.087042 env[1431]: time="2024-12-13T14:33:47.087002063Z" level=info msg="CreateContainer within sandbox \"6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:33:47.121279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3377912517.mount: Deactivated successfully. Dec 13 14:33:47.132442 env[1431]: time="2024-12-13T14:33:47.132365191Z" level=info msg="CreateContainer within sandbox \"6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"49a1d9822815f7db3ea022770f28bb2b276acf38151490b0be2b0ad16f8192cd\"" Dec 13 14:33:47.133316 env[1431]: time="2024-12-13T14:33:47.133267512Z" level=info msg="StartContainer for \"49a1d9822815f7db3ea022770f28bb2b276acf38151490b0be2b0ad16f8192cd\"" Dec 13 14:33:47.165969 systemd[1]: run-containerd-runc-k8s.io-49a1d9822815f7db3ea022770f28bb2b276acf38151490b0be2b0ad16f8192cd-runc.8FIxsj.mount: Deactivated successfully. Dec 13 14:33:47.168590 systemd[1]: Started cri-containerd-49a1d9822815f7db3ea022770f28bb2b276acf38151490b0be2b0ad16f8192cd.scope. Dec 13 14:33:47.209231 kernel: kauditd_printk_skb: 346 callbacks suppressed Dec 13 14:33:47.209459 kernel: audit: type=1400 audit(1734100427.189:524): avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fecaa7be838 items=0 ppid=2057 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:47.233893 kernel: audit: type=1300 audit(1734100427.189:524): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fecaa7be838 items=0 ppid=2057 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:47.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613164393832323831356637646233656130323237373066323862 Dec 13 14:33:47.258001 kernel: audit: type=1327 audit(1734100427.189:524): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613164393832323831356637646233656130323237373066323862 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.286333 kernel: audit: type=1400 audit(1734100427.189:525): avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.286519 kernel: audit: type=1400 audit(1734100427.189:525): avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.288273 kernel: audit: type=1400 audit(1734100427.189:525): avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.288528 env[1431]: time="2024-12-13T14:33:47.287241502Z" level=info msg="StartContainer for \"49a1d9822815f7db3ea022770f28bb2b276acf38151490b0be2b0ad16f8192cd\" returns successfully" Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.332369 kernel: audit: type=1400 audit(1734100427.189:525): avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.332555 kernel: audit: type=1400 audit(1734100427.189:525): avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.365126 kernel: audit: type=1400 audit(1734100427.189:525): avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.365329 kernel: audit: type=1400 audit(1734100427.189:525): avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.189000 audit: BPF prog-id=70 op=LOAD Dec 13 14:33:47.189000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002863e8 items=0 ppid=2057 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:47.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613164393832323831356637646233656130323237373066323862 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit: BPF prog-id=71 op=LOAD Dec 13 14:33:47.208000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000286438 items=0 ppid=2057 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:47.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613164393832323831356637646233656130323237373066323862 Dec 13 14:33:47.208000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:33:47.208000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.208000 audit: BPF prog-id=72 op=LOAD Dec 13 14:33:47.208000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002864c8 items=0 ppid=2057 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:47.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613164393832323831356637646233656130323237373066323862 Dec 13 14:33:48.068948 kubelet[1951]: E1213 14:33:48.068874 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:48.138020 kubelet[1951]: E1213 14:33:48.137947 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-krrcx" podUID="b926c6e1-0648-4a56-bd4d-00efdc540e40" Dec 13 14:33:48.844400 env[1431]: time="2024-12-13T14:33:48.844296873Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:33:48.847451 kubelet[1951]: I1213 14:33:48.847412 1951 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:33:48.849288 systemd[1]: cri-containerd-49a1d9822815f7db3ea022770f28bb2b276acf38151490b0be2b0ad16f8192cd.scope: Deactivated successfully. Dec 13 14:33:48.853000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:33:48.879326 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-49a1d9822815f7db3ea022770f28bb2b276acf38151490b0be2b0ad16f8192cd-rootfs.mount: Deactivated successfully. Dec 13 14:33:49.070159 kubelet[1951]: E1213 14:33:49.070090 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:50.070763 kubelet[1951]: E1213 14:33:50.070689 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:50.143956 systemd[1]: Created slice kubepods-besteffort-podb926c6e1_0648_4a56_bd4d_00efdc540e40.slice. Dec 13 14:33:50.147063 env[1431]: time="2024-12-13T14:33:50.147009735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-krrcx,Uid:b926c6e1-0648-4a56-bd4d-00efdc540e40,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:50.503206 env[1431]: time="2024-12-13T14:33:50.503140069Z" level=info msg="shim disconnected" id=49a1d9822815f7db3ea022770f28bb2b276acf38151490b0be2b0ad16f8192cd Dec 13 14:33:50.503206 env[1431]: time="2024-12-13T14:33:50.503199671Z" level=warning msg="cleaning up after shim disconnected" id=49a1d9822815f7db3ea022770f28bb2b276acf38151490b0be2b0ad16f8192cd namespace=k8s.io Dec 13 14:33:50.503206 env[1431]: time="2024-12-13T14:33:50.503213071Z" level=info msg="cleaning up dead shim" Dec 13 14:33:50.524161 env[1431]: time="2024-12-13T14:33:50.524103807Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:33:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2419 runtime=io.containerd.runc.v2\n" Dec 13 14:33:50.591124 env[1431]: time="2024-12-13T14:33:50.591028004Z" level=error msg="Failed to destroy network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:50.593569 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2-shm.mount: Deactivated successfully. Dec 13 14:33:50.595310 env[1431]: time="2024-12-13T14:33:50.595230892Z" level=error msg="encountered an error cleaning up failed sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:50.595478 env[1431]: time="2024-12-13T14:33:50.595333894Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-krrcx,Uid:b926c6e1-0648-4a56-bd4d-00efdc540e40,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:50.595756 kubelet[1951]: E1213 14:33:50.595705 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:50.595909 kubelet[1951]: E1213 14:33:50.595823 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-krrcx" Dec 13 14:33:50.595909 kubelet[1951]: E1213 14:33:50.595857 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-krrcx" Dec 13 14:33:50.596266 kubelet[1951]: E1213 14:33:50.595939 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-krrcx_calico-system(b926c6e1-0648-4a56-bd4d-00efdc540e40)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-krrcx_calico-system(b926c6e1-0648-4a56-bd4d-00efdc540e40)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-krrcx" podUID="b926c6e1-0648-4a56-bd4d-00efdc540e40" Dec 13 14:33:50.727559 env[1431]: time="2024-12-13T14:33:50.727427652Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:33:50.727856 kubelet[1951]: I1213 14:33:50.727528 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:33:50.728657 env[1431]: time="2024-12-13T14:33:50.728612476Z" level=info msg="StopPodSandbox for \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\"" Dec 13 14:33:50.766669 env[1431]: time="2024-12-13T14:33:50.765547047Z" level=error msg="StopPodSandbox for \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\" failed" error="failed to destroy network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:50.766875 kubelet[1951]: E1213 14:33:50.766421 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:33:50.766875 kubelet[1951]: E1213 14:33:50.766498 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2"} Dec 13 14:33:50.766875 kubelet[1951]: E1213 14:33:50.766569 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b926c6e1-0648-4a56-bd4d-00efdc540e40\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:50.766875 kubelet[1951]: E1213 14:33:50.766602 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b926c6e1-0648-4a56-bd4d-00efdc540e40\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-krrcx" podUID="b926c6e1-0648-4a56-bd4d-00efdc540e40" Dec 13 14:33:51.054048 systemd[1]: Created slice kubepods-besteffort-pod8cf551f6_dd87_4301_ba37_a862de279a76.slice. Dec 13 14:33:51.071322 kubelet[1951]: E1213 14:33:51.071264 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:51.216533 kubelet[1951]: I1213 14:33:51.216419 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mdfjw\" (UniqueName: \"kubernetes.io/projected/8cf551f6-dd87-4301-ba37-a862de279a76-kube-api-access-mdfjw\") pod \"nginx-deployment-8587fbcb89-thw9z\" (UID: \"8cf551f6-dd87-4301-ba37-a862de279a76\") " pod="default/nginx-deployment-8587fbcb89-thw9z" Dec 13 14:33:51.359686 env[1431]: time="2024-12-13T14:33:51.359225848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-thw9z,Uid:8cf551f6-dd87-4301-ba37-a862de279a76,Namespace:default,Attempt:0,}" Dec 13 14:33:51.483316 env[1431]: time="2024-12-13T14:33:51.483233767Z" level=error msg="Failed to destroy network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:51.483726 env[1431]: time="2024-12-13T14:33:51.483681576Z" level=error msg="encountered an error cleaning up failed sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:51.483846 env[1431]: time="2024-12-13T14:33:51.483757178Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-thw9z,Uid:8cf551f6-dd87-4301-ba37-a862de279a76,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:51.484156 kubelet[1951]: E1213 14:33:51.484106 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:51.484260 kubelet[1951]: E1213 14:33:51.484217 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-thw9z" Dec 13 14:33:51.484260 kubelet[1951]: E1213 14:33:51.484248 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-thw9z" Dec 13 14:33:51.484361 kubelet[1951]: E1213 14:33:51.484334 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-thw9z_default(8cf551f6-dd87-4301-ba37-a862de279a76)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-thw9z_default(8cf551f6-dd87-4301-ba37-a862de279a76)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-thw9z" podUID="8cf551f6-dd87-4301-ba37-a862de279a76" Dec 13 14:33:51.518005 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc-shm.mount: Deactivated successfully. Dec 13 14:33:51.731127 kubelet[1951]: I1213 14:33:51.731083 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:33:51.732158 env[1431]: time="2024-12-13T14:33:51.732099323Z" level=info msg="StopPodSandbox for \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\"" Dec 13 14:33:51.767884 env[1431]: time="2024-12-13T14:33:51.767799149Z" level=error msg="StopPodSandbox for \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\" failed" error="failed to destroy network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:51.768461 kubelet[1951]: E1213 14:33:51.768400 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:33:51.768630 kubelet[1951]: E1213 14:33:51.768484 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc"} Dec 13 14:33:51.768630 kubelet[1951]: E1213 14:33:51.768540 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8cf551f6-dd87-4301-ba37-a862de279a76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:51.768630 kubelet[1951]: E1213 14:33:51.768579 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8cf551f6-dd87-4301-ba37-a862de279a76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-thw9z" podUID="8cf551f6-dd87-4301-ba37-a862de279a76" Dec 13 14:33:52.073221 kubelet[1951]: E1213 14:33:52.072310 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:53.072719 kubelet[1951]: E1213 14:33:53.072637 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:54.073870 kubelet[1951]: E1213 14:33:54.073748 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:55.061415 kubelet[1951]: E1213 14:33:55.061328 1951 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:55.074890 kubelet[1951]: E1213 14:33:55.074778 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:56.075561 kubelet[1951]: E1213 14:33:56.075488 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:57.076393 kubelet[1951]: E1213 14:33:57.076297 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:57.274371 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1303177180.mount: Deactivated successfully. Dec 13 14:33:57.333686 env[1431]: time="2024-12-13T14:33:57.333499730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:57.340690 env[1431]: time="2024-12-13T14:33:57.340628253Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:57.345667 env[1431]: time="2024-12-13T14:33:57.345608539Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:57.350344 env[1431]: time="2024-12-13T14:33:57.350285520Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:57.350997 env[1431]: time="2024-12-13T14:33:57.350952732Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:33:57.369474 env[1431]: time="2024-12-13T14:33:57.369421052Z" level=info msg="CreateContainer within sandbox \"6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:33:57.415682 env[1431]: time="2024-12-13T14:33:57.415604051Z" level=info msg="CreateContainer within sandbox \"6418f91b86d8aa4d13587ed15e7903add873a0c5761d68a2188793a11eaeb1fd\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"cc9e75d12ed8ca9d7cbb81d771a61c7be2a190ef785b3dbd46b795a184359277\"" Dec 13 14:33:57.416735 env[1431]: time="2024-12-13T14:33:57.416693770Z" level=info msg="StartContainer for \"cc9e75d12ed8ca9d7cbb81d771a61c7be2a190ef785b3dbd46b795a184359277\"" Dec 13 14:33:57.439424 systemd[1]: Started cri-containerd-cc9e75d12ed8ca9d7cbb81d771a61c7be2a190ef785b3dbd46b795a184359277.scope. Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.468297 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:33:57.468450 kernel: audit: type=1400 audit(1734100437.462:531): avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f7b85d21dc8 items=0 ppid=2057 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.503419 kernel: audit: type=1300 audit(1734100437.462:531): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f7b85d21dc8 items=0 ppid=2057 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396537356431326564386361396437636262383164373731613631 Dec 13 14:33:57.523033 kernel: audit: type=1327 audit(1734100437.462:531): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396537356431326564386361396437636262383164373731613631 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.552892 kernel: audit: type=1400 audit(1734100437.462:532): avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.553111 kernel: audit: type=1400 audit(1734100437.462:532): avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.567288 kernel: audit: type=1400 audit(1734100437.462:532): avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.582503 kernel: audit: type=1400 audit(1734100437.462:532): avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.614488 kernel: audit: type=1400 audit(1734100437.462:532): avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.614720 kernel: audit: type=1400 audit(1734100437.462:532): avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit: BPF prog-id=73 op=LOAD Dec 13 14:33:57.462000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00026dfb8 items=0 ppid=2057 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.628848 kernel: audit: type=1400 audit(1734100437.462:532): avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396537356431326564386361396437636262383164373731613631 Dec 13 14:33:57.481000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.481000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.481000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.481000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.481000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.481000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.481000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.481000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.481000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.481000 audit: BPF prog-id=74 op=LOAD Dec 13 14:33:57.481000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000350008 items=0 ppid=2057 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396537356431326564386361396437636262383164373731613631 Dec 13 14:33:57.502000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:33:57.502000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.502000 audit: BPF prog-id=75 op=LOAD Dec 13 14:33:57.502000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000350098 items=0 ppid=2057 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396537356431326564386361396437636262383164373731613631 Dec 13 14:33:57.630345 env[1431]: time="2024-12-13T14:33:57.630285567Z" level=info msg="StartContainer for \"cc9e75d12ed8ca9d7cbb81d771a61c7be2a190ef785b3dbd46b795a184359277\" returns successfully" Dec 13 14:33:57.765670 kubelet[1951]: I1213 14:33:57.765582 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-s9wbs" podStartSLOduration=2.823029905 podStartE2EDuration="22.765547808s" podCreationTimestamp="2024-12-13 14:33:35 +0000 UTC" firstStartedPulling="2024-12-13 14:33:37.40964815 +0000 UTC m=+3.550328012" lastFinishedPulling="2024-12-13 14:33:57.352166053 +0000 UTC m=+23.492845915" observedRunningTime="2024-12-13 14:33:57.765332405 +0000 UTC m=+23.906012367" watchObservedRunningTime="2024-12-13 14:33:57.765547808 +0000 UTC m=+23.906227870" Dec 13 14:33:57.960550 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:33:57.960820 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:33:58.077440 kubelet[1951]: E1213 14:33:58.077387 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:58.770477 systemd[1]: run-containerd-runc-k8s.io-cc9e75d12ed8ca9d7cbb81d771a61c7be2a190ef785b3dbd46b795a184359277-runc.dgrvWU.mount: Deactivated successfully. Dec 13 14:33:59.078359 kubelet[1951]: E1213 14:33:59.078190 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:59.264000 audit[2681]: AVC avc: denied { write } for pid=2681 comm="tee" name="fd" dev="proc" ino=23065 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:59.264000 audit[2681]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdad636a1e a2=241 a3=1b6 items=1 ppid=2655 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.264000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:33:59.264000 audit: PATH item=0 name="/dev/fd/63" inode=23050 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:59.264000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:59.271000 audit[2683]: AVC avc: denied { write } for pid=2683 comm="tee" name="fd" dev="proc" ino=24082 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:59.271000 audit[2683]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe0215a1d a2=241 a3=1b6 items=1 ppid=2659 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.274000 audit[2686]: AVC avc: denied { write } for pid=2686 comm="tee" name="fd" dev="proc" ino=24086 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:59.274000 audit[2686]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7184ea0e a2=241 a3=1b6 items=1 ppid=2657 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.276000 audit[2688]: AVC avc: denied { write } for pid=2688 comm="tee" name="fd" dev="proc" ino=23069 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:59.271000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:33:59.271000 audit: PATH item=0 name="/dev/fd/63" inode=23055 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:59.271000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:59.274000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:33:59.274000 audit: PATH item=0 name="/dev/fd/63" inode=23056 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:59.274000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:59.276000 audit[2688]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe418cea1d a2=241 a3=1b6 items=1 ppid=2652 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.276000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:33:59.276000 audit: PATH item=0 name="/dev/fd/63" inode=24074 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:59.276000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:59.281000 audit[2690]: AVC avc: denied { write } for pid=2690 comm="tee" name="fd" dev="proc" ino=24092 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:59.281000 audit[2690]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc34950a1d a2=241 a3=1b6 items=1 ppid=2651 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.281000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:33:59.281000 audit: PATH item=0 name="/dev/fd/63" inode=24077 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:59.281000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:59.297000 audit[2710]: AVC avc: denied { write } for pid=2710 comm="tee" name="fd" dev="proc" ino=24102 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:59.297000 audit[2710]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe03b38a1f a2=241 a3=1b6 items=1 ppid=2668 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.297000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:33:59.297000 audit: PATH item=0 name="/dev/fd/63" inode=24094 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:59.300000 audit[2716]: AVC avc: denied { write } for pid=2716 comm="tee" name="fd" dev="proc" ino=24106 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:59.300000 audit[2716]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffccac10a0d a2=241 a3=1b6 items=1 ppid=2660 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.300000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:33:59.300000 audit: PATH item=0 name="/dev/fd/63" inode=24097 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:59.297000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:59.300000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit: BPF prog-id=76 op=LOAD Dec 13 14:33:59.538000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe21a590c0 a2=98 a3=3 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.538000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.538000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit: BPF prog-id=77 op=LOAD Dec 13 14:33:59.538000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe21a58ea0 a2=74 a3=540051 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.538000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.538000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.538000 audit: BPF prog-id=78 op=LOAD Dec 13 14:33:59.538000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe21a58ed0 a2=94 a3=2 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.538000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.538000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit: BPF prog-id=79 op=LOAD Dec 13 14:33:59.652000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe21a58d90 a2=40 a3=1 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.652000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:33:59.652000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.652000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe21a58e60 a2=50 a3=7ffe21a58f40 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe21a58da0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe21a58dd0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe21a58ce0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe21a58df0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe21a58dd0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe21a58dc0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe21a58df0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe21a58dd0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe21a58df0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.662000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.662000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe21a58dc0 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe21a58e30 a2=28 a3=0 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe21a58be0 a2=50 a3=1 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit: BPF prog-id=80 op=LOAD Dec 13 14:33:59.663000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe21a58be0 a2=94 a3=5 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.663000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe21a58c90 a2=50 a3=1 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe21a58db0 a2=4 a3=38 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.663000 audit[2761]: AVC avc: denied { confidentiality } for pid=2761 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:59.663000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe21a58e00 a2=94 a3=6 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { confidentiality } for pid=2761 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:59.664000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe21a585b0 a2=94 a3=83 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.664000 audit[2761]: AVC avc: denied { confidentiality } for pid=2761 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:59.664000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe21a585b0 a2=94 a3=83 items=0 ppid=2653 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit: BPF prog-id=81 op=LOAD Dec 13 14:33:59.674000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc1cc64b0 a2=98 a3=1999999999999999 items=0 ppid=2653 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.674000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:59.674000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit: BPF prog-id=82 op=LOAD Dec 13 14:33:59.674000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc1cc6390 a2=74 a3=ffff items=0 ppid=2653 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.674000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:59.674000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.674000 audit: BPF prog-id=83 op=LOAD Dec 13 14:33:59.674000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc1cc63d0 a2=40 a3=7ffcc1cc65b0 items=0 ppid=2653 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.674000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:59.674000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:33:59.846123 systemd-networkd[1580]: vxlan.calico: Link UP Dec 13 14:33:59.846142 systemd-networkd[1580]: vxlan.calico: Gained carrier Dec 13 14:33:59.902000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.902000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.902000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.902000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.902000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.902000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.902000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.902000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.902000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.902000 audit: BPF prog-id=84 op=LOAD Dec 13 14:33:59.902000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff33695b00 a2=98 a3=ffffffff items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.902000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.902000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit: BPF prog-id=85 op=LOAD Dec 13 14:33:59.903000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff33695910 a2=74 a3=540051 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.903000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit: BPF prog-id=86 op=LOAD Dec 13 14:33:59.903000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff33695940 a2=94 a3=2 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.903000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff33695810 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff33695840 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.903000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.903000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff33695750 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff33695860 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff33695840 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff33695830 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff33695860 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff33695840 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff33695860 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff33695830 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff336958a0 a2=28 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.906000 audit: BPF prog-id=87 op=LOAD Dec 13 14:33:59.906000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff33695710 a2=40 a3=0 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.906000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff33695700 a2=50 a3=2800 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.907000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff33695700 a2=50 a3=2800 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.907000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit: BPF prog-id=88 op=LOAD Dec 13 14:33:59.907000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff33694f20 a2=94 a3=2 items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.907000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.907000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.907000 audit: BPF prog-id=89 op=LOAD Dec 13 14:33:59.907000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff33695020 a2=94 a3=2d items=0 ppid=2653 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.907000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit: BPF prog-id=90 op=LOAD Dec 13 14:33:59.918000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd57b46030 a2=98 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.918000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:59.918000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit: BPF prog-id=91 op=LOAD Dec 13 14:33:59.918000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd57b45e10 a2=74 a3=540051 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.918000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:59.918000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.918000 audit: BPF prog-id=92 op=LOAD Dec 13 14:33:59.918000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd57b45e40 a2=94 a3=2 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.918000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:59.918000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit: BPF prog-id=93 op=LOAD Dec 13 14:34:00.040000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd57b45d00 a2=40 a3=1 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.040000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.040000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:34:00.040000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.040000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd57b45dd0 a2=50 a3=7ffd57b45eb0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.040000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd57b45d10 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd57b45d40 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd57b45c50 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd57b45d60 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd57b45d40 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd57b45d30 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd57b45d60 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd57b45d40 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd57b45d60 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd57b45d30 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.050000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.050000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd57b45da0 a2=28 a3=0 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd57b45b50 a2=50 a3=1 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit: BPF prog-id=94 op=LOAD Dec 13 14:34:00.051000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd57b45b50 a2=94 a3=5 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.051000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd57b45c00 a2=50 a3=1 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd57b45d20 a2=4 a3=38 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { confidentiality } for pid=2794 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:00.051000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd57b45d70 a2=94 a3=6 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.051000 audit[2794]: AVC avc: denied { confidentiality } for pid=2794 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:00.051000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd57b45520 a2=94 a3=83 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd57b45520 a2=94 a3=83 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd57b46f60 a2=10 a3=f1f00800 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd57b46e00 a2=10 a3=3 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd57b46da0 a2=10 a3=3 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.052000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.052000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd57b46da0 a2=10 a3=7 items=0 ppid=2653 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:00.061000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:34:00.079391 kubelet[1951]: E1213 14:34:00.079338 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:00.234000 audit[2820]: NETFILTER_CFG table=mangle:69 family=2 entries=16 op=nft_register_chain pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:00.234000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcf5045bc0 a2=0 a3=7ffcf5045bac items=0 ppid=2653 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.234000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:00.317000 audit[2818]: NETFILTER_CFG table=nat:70 family=2 entries=15 op=nft_register_chain pid=2818 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:00.317000 audit[2818]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc93cbcd90 a2=0 a3=7ffc93cbcd7c items=0 ppid=2653 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.317000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:00.319000 audit[2826]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:00.319000 audit[2826]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe899f1290 a2=0 a3=7ffe899f127c items=0 ppid=2653 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.319000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:00.321000 audit[2817]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:00.321000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcf467a0b0 a2=0 a3=7ffcf467a09c items=0 ppid=2653 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.321000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:01.017154 systemd-networkd[1580]: vxlan.calico: Gained IPv6LL Dec 13 14:34:01.079758 kubelet[1951]: E1213 14:34:01.079674 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:02.080083 kubelet[1951]: E1213 14:34:02.080021 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:03.080902 kubelet[1951]: E1213 14:34:03.080836 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:03.140011 env[1431]: time="2024-12-13T14:34:03.139640751Z" level=info msg="StopPodSandbox for \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\"" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.192 [INFO][2847] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.192 [INFO][2847] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" iface="eth0" netns="/var/run/netns/cni-501b4a27-32b0-e22e-8828-2d40d999444f" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.192 [INFO][2847] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" iface="eth0" netns="/var/run/netns/cni-501b4a27-32b0-e22e-8828-2d40d999444f" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.193 [INFO][2847] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" iface="eth0" netns="/var/run/netns/cni-501b4a27-32b0-e22e-8828-2d40d999444f" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.193 [INFO][2847] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.193 [INFO][2847] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.218 [INFO][2853] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" HandleID="k8s-pod-network.7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.218 [INFO][2853] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.218 [INFO][2853] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.227 [WARNING][2853] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" HandleID="k8s-pod-network.7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.227 [INFO][2853] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" HandleID="k8s-pod-network.7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.229 [INFO][2853] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:03.232657 env[1431]: 2024-12-13 14:34:03.231 [INFO][2847] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:03.237340 env[1431]: time="2024-12-13T14:34:03.235572073Z" level=info msg="TearDown network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\" successfully" Dec 13 14:34:03.237340 env[1431]: time="2024-12-13T14:34:03.235637074Z" level=info msg="StopPodSandbox for \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\" returns successfully" Dec 13 14:34:03.235456 systemd[1]: run-netns-cni\x2d501b4a27\x2d32b0\x2de22e\x2d8828\x2d2d40d999444f.mount: Deactivated successfully. Dec 13 14:34:03.237923 env[1431]: time="2024-12-13T14:34:03.237870407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-thw9z,Uid:8cf551f6-dd87-4301-ba37-a862de279a76,Namespace:default,Attempt:1,}" Dec 13 14:34:03.423795 systemd-networkd[1580]: cali752bcc84942: Link UP Dec 13 14:34:03.432912 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:03.439907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali752bcc84942: link becomes ready Dec 13 14:34:03.440229 systemd-networkd[1580]: cali752bcc84942: Gained carrier Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.345 [INFO][2861] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0 nginx-deployment-8587fbcb89- default 8cf551f6-dd87-4301-ba37-a862de279a76 1342 0 2024-12-13 14:33:51 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.22 nginx-deployment-8587fbcb89-thw9z eth0 default [] [] [kns.default ksa.default.default] cali752bcc84942 [] []}} ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Namespace="default" Pod="nginx-deployment-8587fbcb89-thw9z" WorkloadEndpoint="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.345 [INFO][2861] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Namespace="default" Pod="nginx-deployment-8587fbcb89-thw9z" WorkloadEndpoint="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.376 [INFO][2872] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" HandleID="k8s-pod-network.06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.387 [INFO][2872] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" HandleID="k8s-pod-network.06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003be780), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.22", "pod":"nginx-deployment-8587fbcb89-thw9z", "timestamp":"2024-12-13 14:34:03.376898968 +0000 UTC"}, Hostname:"10.200.8.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.387 [INFO][2872] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.387 [INFO][2872] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.387 [INFO][2872] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.22' Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.389 [INFO][2872] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" host="10.200.8.22" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.392 [INFO][2872] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.22" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.396 [INFO][2872] ipam/ipam.go 489: Trying affinity for 192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.398 [INFO][2872] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.401 [INFO][2872] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.401 [INFO][2872] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.64/26 handle="k8s-pod-network.06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" host="10.200.8.22" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.403 [INFO][2872] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425 Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.409 [INFO][2872] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.64/26 handle="k8s-pod-network.06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" host="10.200.8.22" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.415 [INFO][2872] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.65/26] block=192.168.83.64/26 handle="k8s-pod-network.06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" host="10.200.8.22" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.415 [INFO][2872] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.65/26] handle="k8s-pod-network.06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" host="10.200.8.22" Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.415 [INFO][2872] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:03.458405 env[1431]: 2024-12-13 14:34:03.415 [INFO][2872] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.65/26] IPv6=[] ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" HandleID="k8s-pod-network.06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.459444 env[1431]: 2024-12-13 14:34:03.417 [INFO][2861] cni-plugin/k8s.go 386: Populated endpoint ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Namespace="default" Pod="nginx-deployment-8587fbcb89-thw9z" WorkloadEndpoint="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"8cf551f6-dd87-4301-ba37-a862de279a76", ResourceVersion:"1342", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-thw9z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali752bcc84942", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:03.459444 env[1431]: 2024-12-13 14:34:03.417 [INFO][2861] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.65/32] ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Namespace="default" Pod="nginx-deployment-8587fbcb89-thw9z" WorkloadEndpoint="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.459444 env[1431]: 2024-12-13 14:34:03.417 [INFO][2861] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali752bcc84942 ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Namespace="default" Pod="nginx-deployment-8587fbcb89-thw9z" WorkloadEndpoint="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.459444 env[1431]: 2024-12-13 14:34:03.441 [INFO][2861] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Namespace="default" Pod="nginx-deployment-8587fbcb89-thw9z" WorkloadEndpoint="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.459444 env[1431]: 2024-12-13 14:34:03.441 [INFO][2861] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Namespace="default" Pod="nginx-deployment-8587fbcb89-thw9z" WorkloadEndpoint="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"8cf551f6-dd87-4301-ba37-a862de279a76", ResourceVersion:"1342", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425", Pod:"nginx-deployment-8587fbcb89-thw9z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali752bcc84942", MAC:"62:1a:42:50:a0:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:03.459444 env[1431]: 2024-12-13 14:34:03.454 [INFO][2861] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425" Namespace="default" Pod="nginx-deployment-8587fbcb89-thw9z" WorkloadEndpoint="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:03.472000 audit[2891]: NETFILTER_CFG table=filter:73 family=2 entries=34 op=nft_register_chain pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:03.477820 kernel: kauditd_printk_skb: 554 callbacks suppressed Dec 13 14:34:03.477961 kernel: audit: type=1325 audit(1734100443.472:639): table=filter:73 family=2 entries=34 op=nft_register_chain pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:03.513402 kernel: audit: type=1300 audit(1734100443.472:639): arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffce830e560 a2=0 a3=7ffce830e54c items=0 ppid=2653 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.472000 audit[2891]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffce830e560 a2=0 a3=7ffce830e54c items=0 ppid=2653 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.513822 env[1431]: time="2024-12-13T14:34:03.494877017Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:03.513822 env[1431]: time="2024-12-13T14:34:03.494963618Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:03.513822 env[1431]: time="2024-12-13T14:34:03.494988519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:03.513822 env[1431]: time="2024-12-13T14:34:03.495147621Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425 pid=2902 runtime=io.containerd.runc.v2 Dec 13 14:34:03.472000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:03.537813 kernel: audit: type=1327 audit(1734100443.472:639): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:03.531059 systemd[1]: Started cri-containerd-06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425.scope. Dec 13 14:34:03.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.585401 kernel: audit: type=1400 audit(1734100443.557:640): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.585597 kernel: audit: type=1400 audit(1734100443.557:641): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.585631 kernel: audit: type=1400 audit(1734100443.557:642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.627810 kernel: audit: type=1400 audit(1734100443.557:643): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.628002 kernel: audit: type=1400 audit(1734100443.557:644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.628040 kernel: audit: type=1400 audit(1734100443.557:645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.661863 kernel: audit: type=1400 audit(1734100443.557:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.598000 audit: BPF prog-id=95 op=LOAD Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2902 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666135393933613236356436363231316339336537326663346236 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2902 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666135393933613236356436363231316339336537326663346236 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.603000 audit: BPF prog-id=96 op=LOAD Dec 13 14:34:03.603000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024840 items=0 ppid=2902 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666135393933613236356436363231316339336537326663346236 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit: BPF prog-id=97 op=LOAD Dec 13 14:34:03.641000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024888 items=0 ppid=2902 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666135393933613236356436363231316339336537326663346236 Dec 13 14:34:03.641000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:34:03.641000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:03.641000 audit: BPF prog-id=98 op=LOAD Dec 13 14:34:03.641000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024c98 items=0 ppid=2902 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666135393933613236356436363231316339336537326663346236 Dec 13 14:34:03.695033 env[1431]: time="2024-12-13T14:34:03.694739180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-thw9z,Uid:8cf551f6-dd87-4301-ba37-a862de279a76,Namespace:default,Attempt:1,} returns sandbox id \"06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425\"" Dec 13 14:34:03.699425 env[1431]: time="2024-12-13T14:34:03.699365048Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:34:04.081457 kubelet[1951]: E1213 14:34:04.081261 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:04.473101 systemd-networkd[1580]: cali752bcc84942: Gained IPv6LL Dec 13 14:34:05.081799 kubelet[1951]: E1213 14:34:05.081712 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:05.142934 env[1431]: time="2024-12-13T14:34:05.142870173Z" level=info msg="StopPodSandbox for \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\"" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.283 [INFO][2953] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.283 [INFO][2953] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" iface="eth0" netns="/var/run/netns/cni-72c15bae-c535-af88-6056-016e06d0cef6" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.283 [INFO][2953] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" iface="eth0" netns="/var/run/netns/cni-72c15bae-c535-af88-6056-016e06d0cef6" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.284 [INFO][2953] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" iface="eth0" netns="/var/run/netns/cni-72c15bae-c535-af88-6056-016e06d0cef6" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.284 [INFO][2953] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.284 [INFO][2953] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.310 [INFO][2961] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" HandleID="k8s-pod-network.ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.311 [INFO][2961] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.311 [INFO][2961] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.327 [WARNING][2961] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" HandleID="k8s-pod-network.ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.327 [INFO][2961] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" HandleID="k8s-pod-network.ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.332 [INFO][2961] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:05.340245 env[1431]: 2024-12-13 14:34:05.336 [INFO][2953] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:05.346413 systemd[1]: run-netns-cni\x2d72c15bae\x2dc535\x2daf88\x2d6056\x2d016e06d0cef6.mount: Deactivated successfully. Dec 13 14:34:05.348448 env[1431]: time="2024-12-13T14:34:05.348386869Z" level=info msg="TearDown network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\" successfully" Dec 13 14:34:05.348448 env[1431]: time="2024-12-13T14:34:05.348445770Z" level=info msg="StopPodSandbox for \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\" returns successfully" Dec 13 14:34:05.349716 env[1431]: time="2024-12-13T14:34:05.349658487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-krrcx,Uid:b926c6e1-0648-4a56-bd4d-00efdc540e40,Namespace:calico-system,Attempt:1,}" Dec 13 14:34:05.940998 systemd-networkd[1580]: cali595f566c992: Link UP Dec 13 14:34:05.952097 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:05.952279 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali595f566c992: link becomes ready Dec 13 14:34:05.954095 systemd-networkd[1580]: cali595f566c992: Gained carrier Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.841 [INFO][2971] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.22-k8s-csi--node--driver--krrcx-eth0 csi-node-driver- calico-system b926c6e1-0648-4a56-bd4d-00efdc540e40 1351 0 2024-12-13 14:33:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.8.22 csi-node-driver-krrcx eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali595f566c992 [] []}} ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Namespace="calico-system" Pod="csi-node-driver-krrcx" WorkloadEndpoint="10.200.8.22-k8s-csi--node--driver--krrcx-" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.841 [INFO][2971] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Namespace="calico-system" Pod="csi-node-driver-krrcx" WorkloadEndpoint="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.890 [INFO][2984] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" HandleID="k8s-pod-network.2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.902 [INFO][2984] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" HandleID="k8s-pod-network.2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f7a20), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.22", "pod":"csi-node-driver-krrcx", "timestamp":"2024-12-13 14:34:05.89048631 +0000 UTC"}, Hostname:"10.200.8.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.902 [INFO][2984] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.902 [INFO][2984] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.902 [INFO][2984] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.22' Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.904 [INFO][2984] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" host="10.200.8.22" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.908 [INFO][2984] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.22" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.913 [INFO][2984] ipam/ipam.go 489: Trying affinity for 192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.915 [INFO][2984] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.918 [INFO][2984] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.918 [INFO][2984] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.64/26 handle="k8s-pod-network.2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" host="10.200.8.22" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.919 [INFO][2984] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.924 [INFO][2984] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.64/26 handle="k8s-pod-network.2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" host="10.200.8.22" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.934 [INFO][2984] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.66/26] block=192.168.83.64/26 handle="k8s-pod-network.2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" host="10.200.8.22" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.934 [INFO][2984] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.66/26] handle="k8s-pod-network.2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" host="10.200.8.22" Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.934 [INFO][2984] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:05.969526 env[1431]: 2024-12-13 14:34:05.935 [INFO][2984] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.66/26] IPv6=[] ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" HandleID="k8s-pod-network.2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.970702 env[1431]: 2024-12-13 14:34:05.937 [INFO][2971] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Namespace="calico-system" Pod="csi-node-driver-krrcx" WorkloadEndpoint="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-csi--node--driver--krrcx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b926c6e1-0648-4a56-bd4d-00efdc540e40", ResourceVersion:"1351", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"", Pod:"csi-node-driver-krrcx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali595f566c992", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:05.970702 env[1431]: 2024-12-13 14:34:05.937 [INFO][2971] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.66/32] ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Namespace="calico-system" Pod="csi-node-driver-krrcx" WorkloadEndpoint="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.970702 env[1431]: 2024-12-13 14:34:05.937 [INFO][2971] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali595f566c992 ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Namespace="calico-system" Pod="csi-node-driver-krrcx" WorkloadEndpoint="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.970702 env[1431]: 2024-12-13 14:34:05.954 [INFO][2971] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Namespace="calico-system" Pod="csi-node-driver-krrcx" WorkloadEndpoint="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.970702 env[1431]: 2024-12-13 14:34:05.955 [INFO][2971] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Namespace="calico-system" Pod="csi-node-driver-krrcx" WorkloadEndpoint="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-csi--node--driver--krrcx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b926c6e1-0648-4a56-bd4d-00efdc540e40", ResourceVersion:"1351", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f", Pod:"csi-node-driver-krrcx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali595f566c992", MAC:"5e:32:ba:6e:01:45", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:05.970702 env[1431]: 2024-12-13 14:34:05.965 [INFO][2971] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f" Namespace="calico-system" Pod="csi-node-driver-krrcx" WorkloadEndpoint="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:05.988000 audit[2998]: NETFILTER_CFG table=filter:74 family=2 entries=38 op=nft_register_chain pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:05.988000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe64a835f0 a2=0 a3=7ffe64a835dc items=0 ppid=2653 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:05.988000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:06.017911 env[1431]: time="2024-12-13T14:34:06.017802199Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:06.017911 env[1431]: time="2024-12-13T14:34:06.017921201Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:06.018230 env[1431]: time="2024-12-13T14:34:06.017947201Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:06.018230 env[1431]: time="2024-12-13T14:34:06.018118603Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f pid=3011 runtime=io.containerd.runc.v2 Dec 13 14:34:06.051071 systemd[1]: Started cri-containerd-2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f.scope. Dec 13 14:34:06.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.083000 audit: BPF prog-id=99 op=LOAD Dec 13 14:34:06.085363 kubelet[1951]: E1213 14:34:06.085119 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3011 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383039373361336534643264366664316165306166316262373137 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3011 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383039373361336534643264366664316165306166316262373137 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.085000 audit: BPF prog-id=100 op=LOAD Dec 13 14:34:06.085000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003287b0 items=0 ppid=3011 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383039373361336534643264366664316165306166316262373137 Dec 13 14:34:06.086000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.086000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.086000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.086000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.086000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.086000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.086000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.086000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.086000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.086000 audit: BPF prog-id=101 op=LOAD Dec 13 14:34:06.086000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003287f8 items=0 ppid=3011 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383039373361336534643264366664316165306166316262373137 Dec 13 14:34:06.087000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:34:06.087000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.087000 audit: BPF prog-id=102 op=LOAD Dec 13 14:34:06.087000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000328c08 items=0 ppid=3011 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383039373361336534643264366664316165306166316262373137 Dec 13 14:34:06.111830 env[1431]: time="2024-12-13T14:34:06.111753291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-krrcx,Uid:b926c6e1-0648-4a56-bd4d-00efdc540e40,Namespace:calico-system,Attempt:1,} returns sandbox id \"2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f\"" Dec 13 14:34:06.636553 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount492340641.mount: Deactivated successfully. Dec 13 14:34:07.086165 kubelet[1951]: E1213 14:34:07.086056 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:07.354098 systemd-networkd[1580]: cali595f566c992: Gained IPv6LL Dec 13 14:34:08.086842 kubelet[1951]: E1213 14:34:08.086750 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:08.226314 env[1431]: time="2024-12-13T14:34:08.226233773Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:08.236971 env[1431]: time="2024-12-13T14:34:08.236879413Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:08.242276 env[1431]: time="2024-12-13T14:34:08.242204982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:08.249384 env[1431]: time="2024-12-13T14:34:08.249320775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:08.250319 env[1431]: time="2024-12-13T14:34:08.250274488Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:34:08.252554 env[1431]: time="2024-12-13T14:34:08.252509417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:34:08.253583 env[1431]: time="2024-12-13T14:34:08.253544131Z" level=info msg="CreateContainer within sandbox \"06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:34:08.318974 env[1431]: time="2024-12-13T14:34:08.318893086Z" level=info msg="CreateContainer within sandbox \"06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"6fd9232080e74029a1c4198e278d9fee4a51a57ab45813efe41a466160fa3e97\"" Dec 13 14:34:08.319945 env[1431]: time="2024-12-13T14:34:08.319804898Z" level=info msg="StartContainer for \"6fd9232080e74029a1c4198e278d9fee4a51a57ab45813efe41a466160fa3e97\"" Dec 13 14:34:08.356548 systemd[1]: Started cri-containerd-6fd9232080e74029a1c4198e278d9fee4a51a57ab45813efe41a466160fa3e97.scope. Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.369000 audit: BPF prog-id=103 op=LOAD Dec 13 14:34:08.370000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.370000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2902 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666643932333230383065373430323961316334313938653237386439 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2902 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666643932333230383065373430323961316334313938653237386439 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.371000 audit: BPF prog-id=104 op=LOAD Dec 13 14:34:08.371000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002113a0 items=0 ppid=2902 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666643932333230383065373430323961316334313938653237386439 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit: BPF prog-id=105 op=LOAD Dec 13 14:34:08.372000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002113e8 items=0 ppid=2902 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666643932333230383065373430323961316334313938653237386439 Dec 13 14:34:08.372000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:34:08.372000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.372000 audit: BPF prog-id=106 op=LOAD Dec 13 14:34:08.372000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002117f8 items=0 ppid=2902 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666643932333230383065373430323961316334313938653237386439 Dec 13 14:34:08.397685 env[1431]: time="2024-12-13T14:34:08.397603116Z" level=info msg="StartContainer for \"6fd9232080e74029a1c4198e278d9fee4a51a57ab45813efe41a466160fa3e97\" returns successfully" Dec 13 14:34:08.789487 kubelet[1951]: I1213 14:34:08.789399 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-thw9z" podStartSLOduration=13.236212772 podStartE2EDuration="17.789368942s" podCreationTimestamp="2024-12-13 14:33:51 +0000 UTC" firstStartedPulling="2024-12-13 14:34:03.698709239 +0000 UTC m=+29.839389101" lastFinishedPulling="2024-12-13 14:34:08.251865409 +0000 UTC m=+34.392545271" observedRunningTime="2024-12-13 14:34:08.78925214 +0000 UTC m=+34.929932002" watchObservedRunningTime="2024-12-13 14:34:08.789368942 +0000 UTC m=+34.930048904" Dec 13 14:34:09.087796 kubelet[1951]: E1213 14:34:09.087603 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:09.631305 env[1431]: time="2024-12-13T14:34:09.631230658Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.638051 env[1431]: time="2024-12-13T14:34:09.637978845Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.643932 env[1431]: time="2024-12-13T14:34:09.643871520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.649169 env[1431]: time="2024-12-13T14:34:09.649097887Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.649695 env[1431]: time="2024-12-13T14:34:09.649645694Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:34:09.652589 env[1431]: time="2024-12-13T14:34:09.652542131Z" level=info msg="CreateContainer within sandbox \"2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:34:09.704349 env[1431]: time="2024-12-13T14:34:09.704269191Z" level=info msg="CreateContainer within sandbox \"2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"59dba2732b3a312480a51035d8e34c8d1beb6bacf1f3b76717fc37c8a44774fa\"" Dec 13 14:34:09.705177 env[1431]: time="2024-12-13T14:34:09.705137402Z" level=info msg="StartContainer for \"59dba2732b3a312480a51035d8e34c8d1beb6bacf1f3b76717fc37c8a44774fa\"" Dec 13 14:34:09.739499 systemd[1]: Started cri-containerd-59dba2732b3a312480a51035d8e34c8d1beb6bacf1f3b76717fc37c8a44774fa.scope. Dec 13 14:34:09.765000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.771042 kernel: kauditd_printk_skb: 167 callbacks suppressed Dec 13 14:34:09.771190 kernel: audit: type=1400 audit(1734100449.765:695): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806622 kernel: audit: type=1300 audit(1734100449.765:695): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb1c5905508 items=0 ppid=3011 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.765000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb1c5905508 items=0 ppid=3011 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646261323733326233613331323438306135313033356438653334 Dec 13 14:34:09.829942 kernel: audit: type=1327 audit(1734100449.765:695): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646261323733326233613331323438306135313033356438653334 Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.844654 env[1431]: time="2024-12-13T14:34:09.844577283Z" level=info msg="StartContainer for \"59dba2732b3a312480a51035d8e34c8d1beb6bacf1f3b76717fc37c8a44774fa\" returns successfully" Dec 13 14:34:09.844901 kernel: audit: type=1400 audit(1734100449.770:696): avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.849309 env[1431]: time="2024-12-13T14:34:09.849254142Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.866857 kernel: audit: type=1400 audit(1734100449.770:696): avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.867075 kernel: audit: type=1400 audit(1734100449.770:696): avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.894025 kernel: audit: type=1400 audit(1734100449.770:696): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.895537 kernel: audit: type=1400 audit(1734100449.770:696): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.921696 kernel: audit: type=1400 audit(1734100449.770:696): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.921973 kernel: audit: type=1400 audit(1734100449.770:696): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.770000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.770000 audit: BPF prog-id=107 op=LOAD Dec 13 14:34:09.770000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000306e18 items=0 ppid=3011 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646261323733326233613331323438306135313033356438653334 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit: BPF prog-id=108 op=LOAD Dec 13 14:34:09.806000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000306e68 items=0 ppid=3011 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646261323733326233613331323438306135313033356438653334 Dec 13 14:34:09.806000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:34:09.806000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.806000 audit: BPF prog-id=109 op=LOAD Dec 13 14:34:09.806000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000306ef8 items=0 ppid=3011 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646261323733326233613331323438306135313033356438653334 Dec 13 14:34:10.088559 kubelet[1951]: E1213 14:34:10.088475 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:11.089402 kubelet[1951]: E1213 14:34:11.089342 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:11.441171 env[1431]: time="2024-12-13T14:34:11.441102100Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:11.449400 env[1431]: time="2024-12-13T14:34:11.449334800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:11.454561 env[1431]: time="2024-12-13T14:34:11.454476163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:11.460859 env[1431]: time="2024-12-13T14:34:11.460795940Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:11.461478 env[1431]: time="2024-12-13T14:34:11.461435747Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:34:11.464422 env[1431]: time="2024-12-13T14:34:11.464378083Z" level=info msg="CreateContainer within sandbox \"2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:34:11.501025 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4094921025.mount: Deactivated successfully. Dec 13 14:34:11.519470 env[1431]: time="2024-12-13T14:34:11.519387352Z" level=info msg="CreateContainer within sandbox \"2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e7db51ef023066ed22235d7a9c67800b2e53efaa6d6a9f23cbb24b080ba1d67d\"" Dec 13 14:34:11.520657 env[1431]: time="2024-12-13T14:34:11.520608767Z" level=info msg="StartContainer for \"e7db51ef023066ed22235d7a9c67800b2e53efaa6d6a9f23cbb24b080ba1d67d\"" Dec 13 14:34:11.547278 systemd[1]: Started cri-containerd-e7db51ef023066ed22235d7a9c67800b2e53efaa6d6a9f23cbb24b080ba1d67d.scope. Dec 13 14:34:11.575000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.575000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb7bd571238 items=0 ppid=3011 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537646235316566303233303636656432323233356437613963363738 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.576000 audit: BPF prog-id=110 op=LOAD Dec 13 14:34:11.576000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00030c848 items=0 ppid=3011 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537646235316566303233303636656432323233356437613963363738 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit: BPF prog-id=111 op=LOAD Dec 13 14:34:11.577000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00030c898 items=0 ppid=3011 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537646235316566303233303636656432323233356437613963363738 Dec 13 14:34:11.577000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:34:11.577000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.577000 audit: BPF prog-id=112 op=LOAD Dec 13 14:34:11.577000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00030c928 items=0 ppid=3011 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537646235316566303233303636656432323233356437613963363738 Dec 13 14:34:11.605045 env[1431]: time="2024-12-13T14:34:11.604968594Z" level=info msg="StartContainer for \"e7db51ef023066ed22235d7a9c67800b2e53efaa6d6a9f23cbb24b080ba1d67d\" returns successfully" Dec 13 14:34:11.841722 kubelet[1951]: I1213 14:34:11.840326 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-krrcx" podStartSLOduration=31.491800918 podStartE2EDuration="36.840302157s" podCreationTimestamp="2024-12-13 14:33:35 +0000 UTC" firstStartedPulling="2024-12-13 14:34:06.114124323 +0000 UTC m=+32.254804185" lastFinishedPulling="2024-12-13 14:34:11.462625562 +0000 UTC m=+37.603305424" observedRunningTime="2024-12-13 14:34:11.839642749 +0000 UTC m=+37.980322711" watchObservedRunningTime="2024-12-13 14:34:11.840302157 +0000 UTC m=+37.980982119" Dec 13 14:34:12.089953 kubelet[1951]: E1213 14:34:12.089885 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:12.202098 kubelet[1951]: I1213 14:34:12.202056 1951 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:34:12.202098 kubelet[1951]: I1213 14:34:12.202097 1951 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:34:13.091055 kubelet[1951]: E1213 14:34:13.090989 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:14.092161 kubelet[1951]: E1213 14:34:14.091985 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:15.061605 kubelet[1951]: E1213 14:34:15.061542 1951 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:15.093247 kubelet[1951]: E1213 14:34:15.093173 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:15.526691 systemd[1]: run-containerd-runc-k8s.io-cc9e75d12ed8ca9d7cbb81d771a61c7be2a190ef785b3dbd46b795a184359277-runc.xK420k.mount: Deactivated successfully. Dec 13 14:34:16.093791 kubelet[1951]: E1213 14:34:16.093694 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:16.269000 audit[3212]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=3212 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:16.275264 kernel: kauditd_printk_skb: 76 callbacks suppressed Dec 13 14:34:16.275429 kernel: audit: type=1325 audit(1734100456.269:707): table=filter:75 family=2 entries=20 op=nft_register_rule pid=3212 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:16.269000 audit[3212]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdfd5b2690 a2=0 a3=7ffdfd5b267c items=0 ppid=2131 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.308938 kernel: audit: type=1300 audit(1734100456.269:707): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdfd5b2690 a2=0 a3=7ffdfd5b267c items=0 ppid=2131 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.309125 kernel: audit: type=1327 audit(1734100456.269:707): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:16.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:16.306000 audit[3212]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3212 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:16.318800 kernel: audit: type=1325 audit(1734100456.306:708): table=nat:76 family=2 entries=22 op=nft_register_rule pid=3212 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:16.306000 audit[3212]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdfd5b2690 a2=0 a3=0 items=0 ppid=2131 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.335903 systemd[1]: Created slice kubepods-besteffort-pod0c8e4765_a5c4_476f_9a90_8938bd54fa0c.slice. Dec 13 14:34:16.350838 kernel: audit: type=1300 audit(1734100456.306:708): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdfd5b2690 a2=0 a3=0 items=0 ppid=2131 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.351064 kernel: audit: type=1327 audit(1734100456.306:708): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:16.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:16.369000 audit[3216]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:16.381805 kernel: audit: type=1325 audit(1734100456.369:709): table=filter:77 family=2 entries=32 op=nft_register_rule pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:16.382008 kernel: audit: type=1300 audit(1734100456.369:709): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc716f49a0 a2=0 a3=7ffc716f498c items=0 ppid=2131 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.369000 audit[3216]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc716f49a0 a2=0 a3=7ffc716f498c items=0 ppid=2131 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.403832 kernel: audit: type=1327 audit(1734100456.369:709): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:16.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:16.408670 kubelet[1951]: I1213 14:34:16.408625 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hlzl9\" (UniqueName: \"kubernetes.io/projected/0c8e4765-a5c4-476f-9a90-8938bd54fa0c-kube-api-access-hlzl9\") pod \"nfs-server-provisioner-0\" (UID: \"0c8e4765-a5c4-476f-9a90-8938bd54fa0c\") " pod="default/nfs-server-provisioner-0" Dec 13 14:34:16.408928 kubelet[1951]: I1213 14:34:16.408911 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/0c8e4765-a5c4-476f-9a90-8938bd54fa0c-data\") pod \"nfs-server-provisioner-0\" (UID: \"0c8e4765-a5c4-476f-9a90-8938bd54fa0c\") " pod="default/nfs-server-provisioner-0" Dec 13 14:34:16.384000 audit[3216]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:16.414806 kernel: audit: type=1325 audit(1734100456.384:710): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:16.384000 audit[3216]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc716f49a0 a2=0 a3=0 items=0 ppid=2131 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.384000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:16.646212 env[1431]: time="2024-12-13T14:34:16.642139133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0c8e4765-a5c4-476f-9a90-8938bd54fa0c,Namespace:default,Attempt:0,}" Dec 13 14:34:16.801456 systemd-networkd[1580]: cali60e51b789ff: Link UP Dec 13 14:34:16.814366 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:16.814542 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:34:16.815566 systemd-networkd[1580]: cali60e51b789ff: Gained carrier Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.724 [INFO][3218] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.22-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 0c8e4765-a5c4-476f-9a90-8938bd54fa0c 1416 0 2024-12-13 14:34:16 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.22 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.22-k8s-nfs--server--provisioner--0-" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.725 [INFO][3218] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.756 [INFO][3230] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" HandleID="k8s-pod-network.2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Workload="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.766 [INFO][3230] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" HandleID="k8s-pod-network.2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Workload="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ed600), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.22", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:34:16.756865274 +0000 UTC"}, Hostname:"10.200.8.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.767 [INFO][3230] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.767 [INFO][3230] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.767 [INFO][3230] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.22' Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.769 [INFO][3230] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" host="10.200.8.22" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.773 [INFO][3230] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.22" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.777 [INFO][3230] ipam/ipam.go 489: Trying affinity for 192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.779 [INFO][3230] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.781 [INFO][3230] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.781 [INFO][3230] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.64/26 handle="k8s-pod-network.2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" host="10.200.8.22" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.782 [INFO][3230] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.788 [INFO][3230] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.64/26 handle="k8s-pod-network.2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" host="10.200.8.22" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.795 [INFO][3230] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.67/26] block=192.168.83.64/26 handle="k8s-pod-network.2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" host="10.200.8.22" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.796 [INFO][3230] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.67/26] handle="k8s-pod-network.2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" host="10.200.8.22" Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.796 [INFO][3230] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:16.829354 env[1431]: 2024-12-13 14:34:16.796 [INFO][3230] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.67/26] IPv6=[] ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" HandleID="k8s-pod-network.2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Workload="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:34:16.832260 env[1431]: 2024-12-13 14:34:16.797 [INFO][3218] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0c8e4765-a5c4-476f-9a90-8938bd54fa0c", ResourceVersion:"1416", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.83.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:16.832260 env[1431]: 2024-12-13 14:34:16.798 [INFO][3218] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.67/32] ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:34:16.832260 env[1431]: 2024-12-13 14:34:16.798 [INFO][3218] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:34:16.832260 env[1431]: 2024-12-13 14:34:16.817 [INFO][3218] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:34:16.837176 env[1431]: 2024-12-13 14:34:16.817 [INFO][3218] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0c8e4765-a5c4-476f-9a90-8938bd54fa0c", ResourceVersion:"1416", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.83.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"9e:44:ad:42:be:e0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:16.837176 env[1431]: 2024-12-13 14:34:16.827 [INFO][3218] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.22-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:34:16.848000 audit[3251]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=3251 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:16.848000 audit[3251]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff02975340 a2=0 a3=7fff0297532c items=0 ppid=2653 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.848000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:16.860753 env[1431]: time="2024-12-13T14:34:16.860647397Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:16.860753 env[1431]: time="2024-12-13T14:34:16.860712997Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:16.860753 env[1431]: time="2024-12-13T14:34:16.860727397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:16.861384 env[1431]: time="2024-12-13T14:34:16.861316804Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a pid=3260 runtime=io.containerd.runc.v2 Dec 13 14:34:16.889597 systemd[1]: Started cri-containerd-2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a.scope. Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.911000 audit: BPF prog-id=113 op=LOAD Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3260 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336261316465356335363766373365346266623637306337663339 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3260 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336261316465356335363766373365346266623637306337663339 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit: BPF prog-id=114 op=LOAD Dec 13 14:34:16.913000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216830 items=0 ppid=3260 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336261316465356335363766373365346266623637306337663339 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit: BPF prog-id=115 op=LOAD Dec 13 14:34:16.913000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216878 items=0 ppid=3260 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336261316465356335363766373365346266623637306337663339 Dec 13 14:34:16.913000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:34:16.913000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.913000 audit: BPF prog-id=116 op=LOAD Dec 13 14:34:16.913000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000216c88 items=0 ppid=3260 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336261316465356335363766373365346266623637306337663339 Dec 13 14:34:16.947212 env[1431]: time="2024-12-13T14:34:16.947082132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0c8e4765-a5c4-476f-9a90-8938bd54fa0c,Namespace:default,Attempt:0,} returns sandbox id \"2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a\"" Dec 13 14:34:16.949886 env[1431]: time="2024-12-13T14:34:16.949758961Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:34:17.094735 kubelet[1951]: E1213 14:34:17.094656 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:17.529465 systemd[1]: run-containerd-runc-k8s.io-2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a-runc.rKju7r.mount: Deactivated successfully. Dec 13 14:34:18.095304 kubelet[1951]: E1213 14:34:18.095228 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:18.809055 systemd-networkd[1580]: cali60e51b789ff: Gained IPv6LL Dec 13 14:34:19.096222 kubelet[1951]: E1213 14:34:19.095997 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:19.846078 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3808928887.mount: Deactivated successfully. Dec 13 14:34:20.096518 kubelet[1951]: E1213 14:34:20.096441 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:21.097540 kubelet[1951]: E1213 14:34:21.097419 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:22.097929 kubelet[1951]: E1213 14:34:22.097863 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:23.098472 kubelet[1951]: E1213 14:34:23.098403 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:24.099394 kubelet[1951]: E1213 14:34:24.099279 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:25.099788 kubelet[1951]: E1213 14:34:25.099691 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:25.893300 env[1431]: time="2024-12-13T14:34:25.893227565Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:25.901928 env[1431]: time="2024-12-13T14:34:25.901860842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:25.907498 env[1431]: time="2024-12-13T14:34:25.907424691Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:25.913064 env[1431]: time="2024-12-13T14:34:25.912997440Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:25.913882 env[1431]: time="2024-12-13T14:34:25.913836248Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:34:25.917033 env[1431]: time="2024-12-13T14:34:25.916983976Z" level=info msg="CreateContainer within sandbox \"2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:34:25.970231 env[1431]: time="2024-12-13T14:34:25.970142947Z" level=info msg="CreateContainer within sandbox \"2e3ba1de5c567f73e4bfb670c7f392e3c21babf5cd7bb85e5d0320f85768e89a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"5e6643985c4ed9e2cb73e803be18c5ed91a78304651abf71bc9b30eef3a98b27\"" Dec 13 14:34:25.971088 env[1431]: time="2024-12-13T14:34:25.971040355Z" level=info msg="StartContainer for \"5e6643985c4ed9e2cb73e803be18c5ed91a78304651abf71bc9b30eef3a98b27\"" Dec 13 14:34:26.006817 systemd[1]: Started cri-containerd-5e6643985c4ed9e2cb73e803be18c5ed91a78304651abf71bc9b30eef3a98b27.scope. Dec 13 14:34:26.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.024803 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:34:26.024861 kernel: audit: type=1400 audit(1734100466.018:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.066019 kernel: audit: type=1400 audit(1734100466.018:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.066204 kernel: audit: type=1400 audit(1734100466.019:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.066230 kernel: audit: type=1400 audit(1734100466.019:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.094056 kernel: audit: type=1400 audit(1734100466.019:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.094314 kernel: audit: type=1400 audit(1734100466.019:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.108653 kubelet[1951]: E1213 14:34:26.108219 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:26.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.124239 kernel: audit: type=1400 audit(1734100466.019:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.153896 kernel: audit: type=1400 audit(1734100466.019:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.154117 kernel: audit: type=1400 audit(1734100466.019:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.175909 kernel: audit: type=1400 audit(1734100466.035:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.035000 audit: BPF prog-id=117 op=LOAD Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3260 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:26.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565363634333938356334656439653263623733653830336265313863 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3260 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:26.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565363634333938356334656439653263623733653830336265313863 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.036000 audit: BPF prog-id=118 op=LOAD Dec 13 14:34:26.036000 audit[3314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023ca00 items=0 ppid=3260 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:26.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565363634333938356334656439653263623733653830336265313863 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit: BPF prog-id=119 op=LOAD Dec 13 14:34:26.078000 audit[3314]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023ca48 items=0 ppid=3260 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:26.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565363634333938356334656439653263623733653830336265313863 Dec 13 14:34:26.078000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:34:26.078000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { perfmon } for pid=3314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit[3314]: AVC avc: denied { bpf } for pid=3314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:26.078000 audit: BPF prog-id=120 op=LOAD Dec 13 14:34:26.078000 audit[3314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023ce58 items=0 ppid=3260 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:26.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565363634333938356334656439653263623733653830336265313863 Dec 13 14:34:26.179193 env[1431]: time="2024-12-13T14:34:26.179129468Z" level=info msg="StartContainer for \"5e6643985c4ed9e2cb73e803be18c5ed91a78304651abf71bc9b30eef3a98b27\" returns successfully" Dec 13 14:34:26.204000 audit[3343]: AVC avc: denied { search } for pid=3343 comm="rpcbind" name="crypto" dev="proc" ino=26842 scontext=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:34:26.204000 audit[3343]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4aa6f1a0c0 a2=0 a3=0 items=0 ppid=3325 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 key=(null) Dec 13 14:34:26.204000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:34:26.245000 audit[3348]: AVC avc: denied { search } for pid=3348 comm="dbus-daemon" name="crypto" dev="proc" ino=26842 scontext=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:34:26.245000 audit[3348]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdadb1160c0 a2=0 a3=0 items=0 ppid=3325 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 key=(null) Dec 13 14:34:26.245000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:34:26.250000 audit[3349]: AVC avc: denied { watch } for pid=3349 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c768,c885 tclass=dir permissive=0 Dec 13 14:34:26.250000 audit[3349]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=556301ca8040 a2=2c8 a3=7ffe42ddf71c items=0 ppid=3325 pid=3349 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 key=(null) Dec 13 14:34:26.250000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:34:26.255000 audit[3350]: AVC avc: denied { read } for pid=3350 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26945 scontext=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:34:26.255000 audit[3350]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f0e3dc23320 a1=80000 a2=d a3=7ffff248b7e0 items=0 ppid=3325 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 key=(null) Dec 13 14:34:26.255000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:34:26.257000 audit[3350]: AVC avc: denied { search } for pid=3350 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26842 scontext=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:34:26.257000 audit[3350]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0e3d1770c0 a2=0 a3=0 items=0 ppid=3325 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c768,c885 key=(null) Dec 13 14:34:26.257000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:34:26.895793 kubelet[1951]: I1213 14:34:26.895707 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.929469184 podStartE2EDuration="10.895685191s" podCreationTimestamp="2024-12-13 14:34:16 +0000 UTC" firstStartedPulling="2024-12-13 14:34:16.949034053 +0000 UTC m=+43.089713915" lastFinishedPulling="2024-12-13 14:34:25.91525006 +0000 UTC m=+52.055929922" observedRunningTime="2024-12-13 14:34:26.895424889 +0000 UTC m=+53.036104851" watchObservedRunningTime="2024-12-13 14:34:26.895685191 +0000 UTC m=+53.036365153" Dec 13 14:34:26.914000 audit[3357]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:26.914000 audit[3357]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd0a00ade0 a2=0 a3=7ffd0a00adcc items=0 ppid=2131 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:26.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:26.920000 audit[3357]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=3357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:26.920000 audit[3357]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd0a00ade0 a2=0 a3=7ffd0a00adcc items=0 ppid=2131 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:26.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:27.109334 kubelet[1951]: E1213 14:34:27.109268 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:28.109743 kubelet[1951]: E1213 14:34:28.109667 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:29.110134 kubelet[1951]: E1213 14:34:29.110064 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:30.111128 kubelet[1951]: E1213 14:34:30.111041 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:31.111936 kubelet[1951]: E1213 14:34:31.111864 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:32.112969 kubelet[1951]: E1213 14:34:32.112900 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:33.113133 kubelet[1951]: E1213 14:34:33.113065 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:34.113717 kubelet[1951]: E1213 14:34:34.113644 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:35.061052 kubelet[1951]: E1213 14:34:35.060987 1951 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:35.103873 env[1431]: time="2024-12-13T14:34:35.103805763Z" level=info msg="StopPodSandbox for \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\"" Dec 13 14:34:35.114159 kubelet[1951]: E1213 14:34:35.114088 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.158 [WARNING][3374] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"8cf551f6-dd87-4301-ba37-a862de279a76", ResourceVersion:"1369", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425", Pod:"nginx-deployment-8587fbcb89-thw9z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali752bcc84942", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.158 [INFO][3374] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.158 [INFO][3374] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" iface="eth0" netns="" Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.158 [INFO][3374] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.158 [INFO][3374] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.195 [INFO][3382] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" HandleID="k8s-pod-network.7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.195 [INFO][3382] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.195 [INFO][3382] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.203 [WARNING][3382] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" HandleID="k8s-pod-network.7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.203 [INFO][3382] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" HandleID="k8s-pod-network.7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.204 [INFO][3382] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:35.207086 env[1431]: 2024-12-13 14:34:35.205 [INFO][3374] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:35.207086 env[1431]: time="2024-12-13T14:34:35.207065113Z" level=info msg="TearDown network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\" successfully" Dec 13 14:34:35.207816 env[1431]: time="2024-12-13T14:34:35.207118814Z" level=info msg="StopPodSandbox for \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\" returns successfully" Dec 13 14:34:35.208634 env[1431]: time="2024-12-13T14:34:35.208588524Z" level=info msg="RemovePodSandbox for \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\"" Dec 13 14:34:35.208819 env[1431]: time="2024-12-13T14:34:35.208639425Z" level=info msg="Forcibly stopping sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\"" Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.261 [WARNING][3402] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"8cf551f6-dd87-4301-ba37-a862de279a76", ResourceVersion:"1369", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"06fa5993a265d66211c93e72fc4b6b12c3132fa3786d322eeb683efd9c821425", Pod:"nginx-deployment-8587fbcb89-thw9z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali752bcc84942", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.261 [INFO][3402] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.261 [INFO][3402] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" iface="eth0" netns="" Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.261 [INFO][3402] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.261 [INFO][3402] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.296 [INFO][3409] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" HandleID="k8s-pod-network.7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.296 [INFO][3409] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.296 [INFO][3409] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.305 [WARNING][3409] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" HandleID="k8s-pod-network.7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.305 [INFO][3409] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" HandleID="k8s-pod-network.7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Workload="10.200.8.22-k8s-nginx--deployment--8587fbcb89--thw9z-eth0" Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.307 [INFO][3409] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:35.310745 env[1431]: 2024-12-13 14:34:35.309 [INFO][3402] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc" Dec 13 14:34:35.310745 env[1431]: time="2024-12-13T14:34:35.310688966Z" level=info msg="TearDown network for sandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\" successfully" Dec 13 14:34:35.322494 env[1431]: time="2024-12-13T14:34:35.321230643Z" level=info msg="RemovePodSandbox \"7e785eb306bf52e1cca3c311266a177e19e88e679755796058439203751a65bc\" returns successfully" Dec 13 14:34:35.323036 env[1431]: time="2024-12-13T14:34:35.322996156Z" level=info msg="StopPodSandbox for \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\"" Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.366 [WARNING][3428] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-csi--node--driver--krrcx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b926c6e1-0648-4a56-bd4d-00efdc540e40", ResourceVersion:"1383", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f", Pod:"csi-node-driver-krrcx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali595f566c992", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.366 [INFO][3428] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.366 [INFO][3428] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" iface="eth0" netns="" Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.366 [INFO][3428] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.366 [INFO][3428] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.392 [INFO][3434] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" HandleID="k8s-pod-network.ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.393 [INFO][3434] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.393 [INFO][3434] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.400 [WARNING][3434] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" HandleID="k8s-pod-network.ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.400 [INFO][3434] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" HandleID="k8s-pod-network.ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.401 [INFO][3434] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:35.404115 env[1431]: 2024-12-13 14:34:35.402 [INFO][3428] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:35.404924 env[1431]: time="2024-12-13T14:34:35.404103745Z" level=info msg="TearDown network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\" successfully" Dec 13 14:34:35.404924 env[1431]: time="2024-12-13T14:34:35.404160545Z" level=info msg="StopPodSandbox for \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\" returns successfully" Dec 13 14:34:35.405087 env[1431]: time="2024-12-13T14:34:35.405051552Z" level=info msg="RemovePodSandbox for \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\"" Dec 13 14:34:35.405166 env[1431]: time="2024-12-13T14:34:35.405097452Z" level=info msg="Forcibly stopping sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\"" Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.451 [WARNING][3452] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-csi--node--driver--krrcx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b926c6e1-0648-4a56-bd4d-00efdc540e40", ResourceVersion:"1383", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"2680973a3e4d2d6fd1ae0af1bb7172acf21a9d485546a1b2984cb9b90c4c854f", Pod:"csi-node-driver-krrcx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali595f566c992", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.452 [INFO][3452] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.452 [INFO][3452] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" iface="eth0" netns="" Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.452 [INFO][3452] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.452 [INFO][3452] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.475 [INFO][3458] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" HandleID="k8s-pod-network.ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.475 [INFO][3458] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.476 [INFO][3458] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.490 [WARNING][3458] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" HandleID="k8s-pod-network.ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.490 [INFO][3458] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" HandleID="k8s-pod-network.ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Workload="10.200.8.22-k8s-csi--node--driver--krrcx-eth0" Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.495 [INFO][3458] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:35.497384 env[1431]: 2024-12-13 14:34:35.496 [INFO][3452] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2" Dec 13 14:34:35.498184 env[1431]: time="2024-12-13T14:34:35.497434723Z" level=info msg="TearDown network for sandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\" successfully" Dec 13 14:34:35.518232 env[1431]: time="2024-12-13T14:34:35.518157874Z" level=info msg="RemovePodSandbox \"ea452dbf689c40c6d90fadf232a00b37388e8ec393f2ef6efdd70ecd2e2b69a2\" returns successfully" Dec 13 14:34:36.114607 kubelet[1951]: E1213 14:34:36.114531 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:37.115438 kubelet[1951]: E1213 14:34:37.115364 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:38.116358 kubelet[1951]: E1213 14:34:38.116285 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:39.117349 kubelet[1951]: E1213 14:34:39.117273 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:40.117797 kubelet[1951]: E1213 14:34:40.117666 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:41.118018 kubelet[1951]: E1213 14:34:41.117937 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:42.119195 kubelet[1951]: E1213 14:34:42.119115 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:43.119970 kubelet[1951]: E1213 14:34:43.119894 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:44.121032 kubelet[1951]: E1213 14:34:44.120958 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:45.121442 kubelet[1951]: E1213 14:34:45.121376 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:45.531148 systemd[1]: run-containerd-runc-k8s.io-cc9e75d12ed8ca9d7cbb81d771a61c7be2a190ef785b3dbd46b795a184359277-runc.1FIB8r.mount: Deactivated successfully. Dec 13 14:34:46.122170 kubelet[1951]: E1213 14:34:46.122099 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:47.123033 kubelet[1951]: E1213 14:34:47.122963 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:48.123390 kubelet[1951]: E1213 14:34:48.123310 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:49.123831 kubelet[1951]: E1213 14:34:49.123738 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:50.125070 kubelet[1951]: E1213 14:34:50.124998 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:51.061778 systemd[1]: Created slice kubepods-besteffort-pod86cddc6e_8593_4944_9ec8_eb8fc0022f6d.slice. Dec 13 14:34:51.125605 kubelet[1951]: E1213 14:34:51.125526 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:51.229497 kubelet[1951]: I1213 14:34:51.229427 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-88d378f1-bf87-468a-a413-6a45d97ecf1f\" (UniqueName: \"kubernetes.io/nfs/86cddc6e-8593-4944-9ec8-eb8fc0022f6d-pvc-88d378f1-bf87-468a-a413-6a45d97ecf1f\") pod \"test-pod-1\" (UID: \"86cddc6e-8593-4944-9ec8-eb8fc0022f6d\") " pod="default/test-pod-1" Dec 13 14:34:51.229915 kubelet[1951]: I1213 14:34:51.229874 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xqhzv\" (UniqueName: \"kubernetes.io/projected/86cddc6e-8593-4944-9ec8-eb8fc0022f6d-kube-api-access-xqhzv\") pod \"test-pod-1\" (UID: \"86cddc6e-8593-4944-9ec8-eb8fc0022f6d\") " pod="default/test-pod-1" Dec 13 14:34:51.571596 kernel: Failed to create system directory netfs Dec 13 14:34:51.571825 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:34:51.571856 kernel: audit: type=1400 audit(1734100491.558:755): avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.571885 kernel: Failed to create system directory netfs Dec 13 14:34:51.558000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.592596 kernel: audit: type=1400 audit(1734100491.558:755): avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.592977 kernel: Failed to create system directory netfs Dec 13 14:34:51.558000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.613331 kernel: audit: type=1400 audit(1734100491.558:755): avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.613526 kernel: Failed to create system directory netfs Dec 13 14:34:51.558000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.656915 kernel: audit: type=1400 audit(1734100491.558:755): avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.558000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.558000 audit[3510]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55959bdd15e0 a1=153bc a2=55957252c2b0 a3=5 items=0 ppid=55 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:51.558000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:51.685419 kernel: audit: type=1300 audit(1734100491.558:755): arch=c000003e syscall=175 success=yes exit=0 a0=55959bdd15e0 a1=153bc a2=55957252c2b0 a3=5 items=0 ppid=55 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:51.685616 kernel: audit: type=1327 audit(1734100491.558:755): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.778899 kernel: Failed to create system directory fscache Dec 13 14:34:51.779094 kernel: audit: type=1400 audit(1734100491.749:756): avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.779127 kernel: Failed to create system directory fscache Dec 13 14:34:51.779148 kernel: audit: type=1400 audit(1734100491.749:756): avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.798995 kernel: Failed to create system directory fscache Dec 13 14:34:51.799185 kernel: audit: type=1400 audit(1734100491.749:756): avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.819494 kernel: Failed to create system directory fscache Dec 13 14:34:51.819680 kernel: audit: type=1400 audit(1734100491.749:756): avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.835841 kernel: Failed to create system directory fscache Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.840798 kernel: Failed to create system directory fscache Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.849993 kernel: Failed to create system directory fscache Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.854177 kernel: Failed to create system directory fscache Dec 13 14:34:51.854313 kernel: Failed to create system directory fscache Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.861865 kernel: Failed to create system directory fscache Dec 13 14:34:51.862011 kernel: Failed to create system directory fscache Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.869643 kernel: Failed to create system directory fscache Dec 13 14:34:51.869796 kernel: Failed to create system directory fscache Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.874253 kernel: Failed to create system directory fscache Dec 13 14:34:51.749000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:51.749000 audit[3510]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55959bfe69c0 a1=4c0fc a2=55957252c2b0 a3=5 items=0 ppid=55 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:51.881984 kernel: FS-Cache: Loaded Dec 13 14:34:51.749000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.066168 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.066326 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.066353 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.073226 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.073332 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.083664 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.083806 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.083835 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.090554 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.097703 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.097838 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.097862 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.104639 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.104786 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.111411 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.111534 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.117642 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.117747 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.124107 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.124223 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.126533 kubelet[1951]: E1213 14:34:52.126485 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.130661 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.130734 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.136969 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.137062 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.143324 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.143429 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.149476 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.149584 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.161292 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.161411 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.167042 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.167141 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.173016 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.173119 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.178516 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.178611 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.182397 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.184849 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.190454 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.190606 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.196374 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.196458 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.202073 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.202158 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.207866 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.207955 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.213516 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.213606 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.219396 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.219535 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.225463 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.225562 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.231206 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.231307 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.237213 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.237334 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.242760 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.242895 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.248451 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.248543 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.254595 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.254673 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.260260 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.260334 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.268613 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.268862 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.274613 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.274713 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.280575 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.280684 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.286394 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.286504 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.289970 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.294780 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.294837 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.301091 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.301260 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.307078 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.307185 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.312982 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.313084 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.318498 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.318556 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.324054 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.324140 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.329721 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.329788 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.335208 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.335301 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.341169 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.341281 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.344974 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.350248 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.350316 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.355946 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.356024 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.361721 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.361815 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.367504 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.367595 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.372895 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.372947 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.380224 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.380305 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.385693 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.385746 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.391243 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.391294 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.397339 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.398150 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.403171 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.403228 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.408927 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.408985 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.414341 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.417141 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.417199 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.422921 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.423002 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.428391 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.428445 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.433757 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.433816 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.439706 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.439768 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.043000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.445669 kernel: Failed to create system directory sunrpc Dec 13 14:34:52.461248 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:34:52.461438 kernel: RPC: Registered udp transport module. Dec 13 14:34:52.461467 kernel: RPC: Registered tcp transport module. Dec 13 14:34:52.467393 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:34:52.043000 audit[3510]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55959c032ad0 a1=1a7f1c a2=55957252c2b0 a3=5 items=6 ppid=55 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:52.043000 audit: CWD cwd="/" Dec 13 14:34:52.043000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:52.043000 audit: PATH item=1 name=(null) inode=27222 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:52.043000 audit: PATH item=2 name=(null) inode=27222 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:52.043000 audit: PATH item=3 name=(null) inode=27223 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:52.043000 audit: PATH item=4 name=(null) inode=27222 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:52.043000 audit: PATH item=5 name=(null) inode=27224 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:52.043000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.737115 kernel: Failed to create system directory nfs Dec 13 14:34:52.737228 kernel: Failed to create system directory nfs Dec 13 14:34:52.737252 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.743240 kernel: Failed to create system directory nfs Dec 13 14:34:52.743310 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.749058 kernel: Failed to create system directory nfs Dec 13 14:34:52.749164 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.754891 kernel: Failed to create system directory nfs Dec 13 14:34:52.754997 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.760130 kernel: Failed to create system directory nfs Dec 13 14:34:52.760225 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.762945 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.765800 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.771228 kernel: Failed to create system directory nfs Dec 13 14:34:52.771425 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.773864 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.779337 kernel: Failed to create system directory nfs Dec 13 14:34:52.779478 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.783172 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.787708 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.793142 kernel: Failed to create system directory nfs Dec 13 14:34:52.793230 kernel: Failed to create system directory nfs Dec 13 14:34:52.793251 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.798711 kernel: Failed to create system directory nfs Dec 13 14:34:52.798811 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.804836 kernel: Failed to create system directory nfs Dec 13 14:34:52.804905 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.810463 kernel: Failed to create system directory nfs Dec 13 14:34:52.810534 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.818272 kernel: Failed to create system directory nfs Dec 13 14:34:52.818380 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.823802 kernel: Failed to create system directory nfs Dec 13 14:34:52.823886 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.829307 kernel: Failed to create system directory nfs Dec 13 14:34:52.829366 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.834971 kernel: Failed to create system directory nfs Dec 13 14:34:52.835065 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.838388 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.843073 kernel: Failed to create system directory nfs Dec 13 14:34:52.843145 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.849066 kernel: Failed to create system directory nfs Dec 13 14:34:52.849166 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.854167 kernel: Failed to create system directory nfs Dec 13 14:34:52.854242 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.859065 kernel: Failed to create system directory nfs Dec 13 14:34:52.859132 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.863901 kernel: Failed to create system directory nfs Dec 13 14:34:52.863989 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.866460 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.868824 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.873493 kernel: Failed to create system directory nfs Dec 13 14:34:52.873548 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.875866 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.880574 kernel: Failed to create system directory nfs Dec 13 14:34:52.880663 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.887482 kernel: Failed to create system directory nfs Dec 13 14:34:52.887546 kernel: Failed to create system directory nfs Dec 13 14:34:52.887567 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.718000 audit[3510]: AVC avc: denied { confidentiality } for pid=3510 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:52.892889 kernel: Failed to create system directory nfs Dec 13 14:34:52.892948 kernel: Failed to create system directory nfs Dec 13 14:34:52.718000 audit[3510]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55959c253700 a1=16e97c a2=55957252c2b0 a3=5 items=0 ppid=55 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:52.718000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:52.917212 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.077294 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.077427 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.077451 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.083053 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.083122 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.088745 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.088850 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.094566 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.094668 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.100388 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.100489 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.106218 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.106309 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.111845 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.111948 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.117671 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.117794 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.126894 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.126961 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.127037 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.127821 kubelet[1951]: E1213 14:34:53.127667 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.133813 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.134868 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.142246 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.142390 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.145420 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.152147 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.152303 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.152330 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.157818 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.160936 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.163850 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.163956 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.169179 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.169287 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.174593 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.174698 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.180872 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.180967 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.186184 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.186259 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.192156 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.192262 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.198314 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.198797 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.204210 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.204297 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.209755 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.209851 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.212847 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.218045 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.218092 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.220910 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.226313 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.226406 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.234364 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.234477 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.239706 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.239814 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.246765 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.246887 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.252061 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.252148 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.257783 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.257866 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.263609 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.263713 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.269238 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.269341 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.274826 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.274898 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.280375 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.280952 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.283849 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.288899 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.289005 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.295176 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.295247 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.301072 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.301134 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.306641 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.306739 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.311853 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.311924 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.317539 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.317637 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.320194 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.325831 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.325928 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.329115 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.336574 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.336655 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.342291 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.342382 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.348699 kernel: Failed to create system directory nfs4 Dec 13 14:34:53.053000 audit[3515]: AVC avc: denied { confidentiality } for pid=3515 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.487459 kernel: NFS: Registering the id_resolver key type Dec 13 14:34:53.487683 kernel: Key type id_resolver registered Dec 13 14:34:53.487716 kernel: Key type id_legacy registered Dec 13 14:34:53.053000 audit[3515]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f8553043010 a1=208de4 a2=564f51c382b0 a3=5 items=0 ppid=55 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:53.053000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.792378 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.792540 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.792574 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.799214 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.799385 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.805129 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.805239 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.811099 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.811231 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.816727 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.816830 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.822511 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.822582 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.828370 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.828443 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.834012 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.834092 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.839468 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.846352 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.846475 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.853891 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.853990 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.854012 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.859668 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.859755 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.780000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:53.865442 kernel: Failed to create system directory rpcgss Dec 13 14:34:53.780000 audit[3516]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fedeae0a010 a1=70af4 a2=55ff6299c2b0 a3=5 items=0 ppid=55 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:53.780000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:34:54.128933 kubelet[1951]: E1213 14:34:54.128735 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:54.604478 nfsidmap[3524]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-cd3a92fabf' Dec 13 14:34:54.629302 nfsidmap[3525]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-cd3a92fabf' Dec 13 14:34:54.643000 audit[1537]: AVC avc: denied { watch_reads } for pid=1537 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:54.643000 audit[1537]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5628ffd06d40 a2=10 a3=56fc668e4a2fdc64 items=0 ppid=1 pid=1537 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.643000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:34:54.644000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:54.644000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:54.644000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:54.644000 audit[1537]: AVC avc: denied { watch_reads } for pid=1537 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:54.644000 audit[1537]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5628ffd06d40 a2=10 a3=56fc668e4a2fdc64 items=0 ppid=1 pid=1537 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.644000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:34:54.644000 audit[1537]: AVC avc: denied { watch_reads } for pid=1537 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:54.644000 audit[1537]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5628ffd06d40 a2=10 a3=56fc668e4a2fdc64 items=0 ppid=1 pid=1537 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.644000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:34:54.666130 env[1431]: time="2024-12-13T14:34:54.665591004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:86cddc6e-8593-4944-9ec8-eb8fc0022f6d,Namespace:default,Attempt:0,}" Dec 13 14:34:54.850234 systemd-networkd[1580]: cali5ec59c6bf6e: Link UP Dec 13 14:34:54.863818 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:54.864054 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:34:54.865023 systemd-networkd[1580]: cali5ec59c6bf6e: Gained carrier Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.772 [INFO][3526] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.22-k8s-test--pod--1-eth0 default 86cddc6e-8593-4944-9ec8-eb8fc0022f6d 1522 0 2024-12-13 14:34:17 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.22 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.22-k8s-test--pod--1-" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.773 [INFO][3526] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.22-k8s-test--pod--1-eth0" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.805 [INFO][3539] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" HandleID="k8s-pod-network.96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Workload="10.200.8.22-k8s-test--pod--1-eth0" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.815 [INFO][3539] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" HandleID="k8s-pod-network.96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Workload="10.200.8.22-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318f80), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.22", "pod":"test-pod-1", "timestamp":"2024-12-13 14:34:54.805741451 +0000 UTC"}, Hostname:"10.200.8.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.816 [INFO][3539] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.816 [INFO][3539] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.816 [INFO][3539] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.22' Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.818 [INFO][3539] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" host="10.200.8.22" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.822 [INFO][3539] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.22" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.825 [INFO][3539] ipam/ipam.go 489: Trying affinity for 192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.827 [INFO][3539] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.830 [INFO][3539] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.64/26 host="10.200.8.22" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.830 [INFO][3539] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.64/26 handle="k8s-pod-network.96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" host="10.200.8.22" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.832 [INFO][3539] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757 Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.839 [INFO][3539] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.64/26 handle="k8s-pod-network.96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" host="10.200.8.22" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.845 [INFO][3539] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.68/26] block=192.168.83.64/26 handle="k8s-pod-network.96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" host="10.200.8.22" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.845 [INFO][3539] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.68/26] handle="k8s-pod-network.96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" host="10.200.8.22" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.845 [INFO][3539] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.845 [INFO][3539] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.68/26] IPv6=[] ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" HandleID="k8s-pod-network.96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Workload="10.200.8.22-k8s-test--pod--1-eth0" Dec 13 14:34:54.885477 env[1431]: 2024-12-13 14:34:54.847 [INFO][3526] cni-plugin/k8s.go 386: Populated endpoint ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.22-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"86cddc6e-8593-4944-9ec8-eb8fc0022f6d", ResourceVersion:"1522", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:54.886653 env[1431]: 2024-12-13 14:34:54.847 [INFO][3526] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.68/32] ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.22-k8s-test--pod--1-eth0" Dec 13 14:34:54.886653 env[1431]: 2024-12-13 14:34:54.847 [INFO][3526] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.22-k8s-test--pod--1-eth0" Dec 13 14:34:54.886653 env[1431]: 2024-12-13 14:34:54.866 [INFO][3526] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.22-k8s-test--pod--1-eth0" Dec 13 14:34:54.886653 env[1431]: 2024-12-13 14:34:54.867 [INFO][3526] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.22-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.22-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"86cddc6e-8593-4944-9ec8-eb8fc0022f6d", ResourceVersion:"1522", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.22", ContainerID:"96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"a2:66:35:57:6d:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:54.886653 env[1431]: 2024-12-13 14:34:54.882 [INFO][3526] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.22-k8s-test--pod--1-eth0" Dec 13 14:34:54.895000 audit[3554]: NETFILTER_CFG table=filter:82 family=2 entries=44 op=nft_register_chain pid=3554 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:54.895000 audit[3554]: SYSCALL arch=c000003e syscall=46 success=yes exit=22252 a0=3 a1=7ffcdb0f1430 a2=0 a3=7ffcdb0f141c items=0 ppid=2653 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.895000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:54.913052 env[1431]: time="2024-12-13T14:34:54.912945421Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:54.913052 env[1431]: time="2024-12-13T14:34:54.912995122Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:54.913052 env[1431]: time="2024-12-13T14:34:54.913009622Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:54.913586 env[1431]: time="2024-12-13T14:34:54.913535624Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757 pid=3567 runtime=io.containerd.runc.v2 Dec 13 14:34:54.942316 systemd[1]: Started cri-containerd-96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757.scope. Dec 13 14:34:54.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit: BPF prog-id=121 op=LOAD Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3567 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623539343338663739376563323734323064373239656363616462 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3567 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623539343338663739376563323734323064373239656363616462 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit: BPF prog-id=122 op=LOAD Dec 13 14:34:54.963000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000321b20 items=0 ppid=3567 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623539343338663739376563323734323064373239656363616462 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.963000 audit: BPF prog-id=123 op=LOAD Dec 13 14:34:54.963000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000321b68 items=0 ppid=3567 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623539343338663739376563323734323064373239656363616462 Dec 13 14:34:54.964000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:34:54.964000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:54.964000 audit: BPF prog-id=124 op=LOAD Dec 13 14:34:54.964000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000321f78 items=0 ppid=3567 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623539343338663739376563323734323064373239656363616462 Dec 13 14:34:54.999870 env[1431]: time="2024-12-13T14:34:54.999816484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:86cddc6e-8593-4944-9ec8-eb8fc0022f6d,Namespace:default,Attempt:0,} returns sandbox id \"96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757\"" Dec 13 14:34:55.002600 env[1431]: time="2024-12-13T14:34:55.002542298Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:34:55.061028 kubelet[1951]: E1213 14:34:55.060947 1951 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:55.129233 kubelet[1951]: E1213 14:34:55.129053 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:55.346086 env[1431]: time="2024-12-13T14:34:55.346012302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:55.352255 env[1431]: time="2024-12-13T14:34:55.352152334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:55.357607 env[1431]: time="2024-12-13T14:34:55.357542562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:55.364605 env[1431]: time="2024-12-13T14:34:55.364532899Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:55.365420 env[1431]: time="2024-12-13T14:34:55.365378903Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:34:55.368656 env[1431]: time="2024-12-13T14:34:55.368609620Z" level=info msg="CreateContainer within sandbox \"96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:34:55.463247 env[1431]: time="2024-12-13T14:34:55.463169717Z" level=info msg="CreateContainer within sandbox \"96b59438f797ec27420d729eccadb09a14c1c6fe51f3b9e956514a0a556bd757\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"e56a53ce8486cf3915a45babe30cad499d8ec863be4c6dbffdae8a7b24c5d008\"" Dec 13 14:34:55.464161 env[1431]: time="2024-12-13T14:34:55.464012321Z" level=info msg="StartContainer for \"e56a53ce8486cf3915a45babe30cad499d8ec863be4c6dbffdae8a7b24c5d008\"" Dec 13 14:34:55.487097 systemd[1]: Started cri-containerd-e56a53ce8486cf3915a45babe30cad499d8ec863be4c6dbffdae8a7b24c5d008.scope. Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.504000 audit: BPF prog-id=125 op=LOAD Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3567 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535366135336365383438366366333931356134356261626533306361 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3567 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535366135336365383438366366333931356134356261626533306361 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit: BPF prog-id=126 op=LOAD Dec 13 14:34:55.505000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00030aff0 items=0 ppid=3567 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535366135336365383438366366333931356134356261626533306361 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit: BPF prog-id=127 op=LOAD Dec 13 14:34:55.505000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00030b038 items=0 ppid=3567 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535366135336365383438366366333931356134356261626533306361 Dec 13 14:34:55.505000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:34:55.505000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:55.505000 audit: BPF prog-id=128 op=LOAD Dec 13 14:34:55.505000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00030b448 items=0 ppid=3567 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535366135336365383438366366333931356134356261626533306361 Dec 13 14:34:55.534648 env[1431]: time="2024-12-13T14:34:55.534570792Z" level=info msg="StartContainer for \"e56a53ce8486cf3915a45babe30cad499d8ec863be4c6dbffdae8a7b24c5d008\" returns successfully" Dec 13 14:34:55.966409 kubelet[1951]: I1213 14:34:55.966331 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=38.601494743 podStartE2EDuration="38.966305358s" podCreationTimestamp="2024-12-13 14:34:17 +0000 UTC" firstStartedPulling="2024-12-13 14:34:55.002117296 +0000 UTC m=+81.142797158" lastFinishedPulling="2024-12-13 14:34:55.366927911 +0000 UTC m=+81.507607773" observedRunningTime="2024-12-13 14:34:55.966017857 +0000 UTC m=+82.106697719" watchObservedRunningTime="2024-12-13 14:34:55.966305358 +0000 UTC m=+82.106985320" Dec 13 14:34:56.130246 kubelet[1951]: E1213 14:34:56.130172 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:56.441079 systemd-networkd[1580]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:34:57.131425 kubelet[1951]: E1213 14:34:57.131353 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:58.131757 kubelet[1951]: E1213 14:34:58.131686 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:59.132726 kubelet[1951]: E1213 14:34:59.132656 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:00.133452 kubelet[1951]: E1213 14:35:00.133377 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:01.134231 kubelet[1951]: E1213 14:35:01.134152 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:02.134429 kubelet[1951]: E1213 14:35:02.134355 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:03.134794 kubelet[1951]: E1213 14:35:03.134712 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:04.135372 kubelet[1951]: E1213 14:35:04.135294 1951 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"