Dec 13 02:05:30.123377 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:05:30.123418 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:05:30.123435 kernel: BIOS-provided physical RAM map: Dec 13 02:05:30.123448 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 02:05:30.123459 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 02:05:30.123471 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 02:05:30.123493 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 02:05:30.123509 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 02:05:30.123522 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 02:05:30.123534 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 02:05:30.123546 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 02:05:30.123558 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 02:05:30.123590 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 02:05:30.123603 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 02:05:30.123623 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 02:05:30.123637 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 02:05:30.123651 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 02:05:30.123666 kernel: NX (Execute Disable) protection: active Dec 13 02:05:30.123681 kernel: efi: EFI v2.70 by EDK II Dec 13 02:05:30.123697 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 02:05:30.123711 kernel: random: crng init done Dec 13 02:05:30.123724 kernel: SMBIOS 2.4 present. Dec 13 02:05:30.123740 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 02:05:30.123753 kernel: Hypervisor detected: KVM Dec 13 02:05:30.123767 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:05:30.123781 kernel: kvm-clock: cpu 0, msr 12619b001, primary cpu clock Dec 13 02:05:30.123796 kernel: kvm-clock: using sched offset of 12924182351 cycles Dec 13 02:05:30.124083 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:05:30.124106 kernel: tsc: Detected 2299.998 MHz processor Dec 13 02:05:30.124120 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:05:30.124136 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:05:30.124151 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 02:05:30.124315 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:05:30.124330 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 02:05:30.124343 kernel: Using GB pages for direct mapping Dec 13 02:05:30.124358 kernel: Secure boot disabled Dec 13 02:05:30.124373 kernel: ACPI: Early table checksum verification disabled Dec 13 02:05:30.124521 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 02:05:30.124536 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 02:05:30.124551 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 02:05:30.124578 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 02:05:30.124594 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 02:05:30.124745 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 02:05:30.124761 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 02:05:30.124777 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 02:05:30.124793 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 02:05:30.124908 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 02:05:30.124925 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 02:05:30.124942 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 02:05:30.124957 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 02:05:30.124973 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 02:05:30.124989 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 02:05:30.125004 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 02:05:30.125020 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 02:05:30.125036 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 02:05:30.125056 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 02:05:30.125072 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 02:05:30.125088 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:05:30.125104 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 02:05:30.125119 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 02:05:30.125135 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 02:05:30.125151 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 02:05:30.125167 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 02:05:30.125191 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 02:05:30.125212 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Dec 13 02:05:30.125228 kernel: Zone ranges: Dec 13 02:05:30.125245 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:05:30.125260 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 02:05:30.125276 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:05:30.125292 kernel: Movable zone start for each node Dec 13 02:05:30.125308 kernel: Early memory node ranges Dec 13 02:05:30.125323 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 02:05:30.125339 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 02:05:30.125359 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 02:05:30.125375 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 02:05:30.125391 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 02:05:30.125407 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:05:30.125423 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 02:05:30.125439 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:05:30.125455 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 02:05:30.125470 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 02:05:30.125486 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 02:05:30.125507 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 02:05:30.125523 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 02:05:30.125539 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 02:05:30.125555 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:05:30.125571 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:05:30.125587 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:05:30.125603 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:05:30.125619 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:05:30.125635 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:05:30.125655 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:05:30.125671 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 02:05:30.125686 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 02:05:30.125702 kernel: Booting paravirtualized kernel on KVM Dec 13 02:05:30.125718 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:05:30.125734 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 02:05:30.125750 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 02:05:30.125766 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 02:05:30.125782 kernel: pcpu-alloc: [0] 0 1 Dec 13 02:05:30.125801 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:05:30.125832 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:05:30.125848 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 02:05:30.125862 kernel: Policy zone: Normal Dec 13 02:05:30.125879 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:05:30.125895 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:05:30.125911 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 02:05:30.125925 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 02:05:30.125939 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:05:30.125957 kernel: Memory: 7515408K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 344876K reserved, 0K cma-reserved) Dec 13 02:05:30.125972 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 02:05:30.125988 kernel: Kernel/User page tables isolation: enabled Dec 13 02:05:30.126003 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:05:30.126019 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:05:30.126034 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:05:30.126050 kernel: rcu: RCU event tracing is enabled. Dec 13 02:05:30.126066 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 02:05:30.126087 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:05:30.126116 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:05:30.126133 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:05:30.126155 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 02:05:30.126182 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 02:05:30.126199 kernel: Console: colour dummy device 80x25 Dec 13 02:05:30.126217 kernel: printk: console [ttyS0] enabled Dec 13 02:05:30.126234 kernel: ACPI: Core revision 20210730 Dec 13 02:05:30.126252 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:05:30.126269 kernel: x2apic enabled Dec 13 02:05:30.126291 kernel: Switched APIC routing to physical x2apic. Dec 13 02:05:30.126308 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 02:05:30.126326 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:05:30.126344 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 02:05:30.126362 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 02:05:30.126380 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 02:05:30.126398 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:05:30.126420 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:05:30.126437 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:05:30.126454 kernel: Spectre V2 : Mitigation: IBRS Dec 13 02:05:30.126470 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:05:30.126487 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:05:30.126504 kernel: RETBleed: Mitigation: IBRS Dec 13 02:05:30.126520 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:05:30.126536 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 02:05:30.126551 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:05:30.126570 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 02:05:30.126586 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:05:30.126602 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:05:30.126619 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:05:30.126636 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:05:30.126653 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:05:30.126670 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 02:05:30.126685 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:05:30.126701 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:05:30.126721 kernel: LSM: Security Framework initializing Dec 13 02:05:30.126737 kernel: SELinux: Initializing. Dec 13 02:05:30.126753 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:05:30.126770 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:05:30.126787 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 02:05:30.126803 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 02:05:30.131485 kernel: signal: max sigframe size: 1776 Dec 13 02:05:30.131513 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:05:30.131531 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:05:30.131553 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:05:30.131570 kernel: x86: Booting SMP configuration: Dec 13 02:05:30.131587 kernel: .... node #0, CPUs: #1 Dec 13 02:05:30.131603 kernel: kvm-clock: cpu 1, msr 12619b041, secondary cpu clock Dec 13 02:05:30.131621 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 02:05:30.131639 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 02:05:30.131656 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:05:30.131673 kernel: smpboot: Max logical packages: 1 Dec 13 02:05:30.131693 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 02:05:30.131710 kernel: devtmpfs: initialized Dec 13 02:05:30.131728 kernel: x86/mm: Memory block size: 128MB Dec 13 02:05:30.131744 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 02:05:30.131762 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:05:30.131779 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 02:05:30.131796 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:05:30.131829 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:05:30.131845 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:05:30.131866 kernel: audit: type=2000 audit(1734055529.317:1): state=initialized audit_enabled=0 res=1 Dec 13 02:05:30.131883 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:05:30.131900 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:05:30.131917 kernel: cpuidle: using governor menu Dec 13 02:05:30.131933 kernel: ACPI: bus type PCI registered Dec 13 02:05:30.131950 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:05:30.131967 kernel: dca service started, version 1.12.1 Dec 13 02:05:30.131984 kernel: PCI: Using configuration type 1 for base access Dec 13 02:05:30.132002 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:05:30.132023 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:05:30.132040 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:05:30.132058 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:05:30.132075 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:05:30.132092 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:05:30.132109 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:05:30.132127 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:05:30.132144 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:05:30.132161 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:05:30.132189 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 02:05:30.132206 kernel: ACPI: Interpreter enabled Dec 13 02:05:30.132224 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 02:05:30.132241 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:05:30.132259 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:05:30.132277 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 02:05:30.132294 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:05:30.132558 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:05:30.132734 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 02:05:30.132756 kernel: PCI host bridge to bus 0000:00 Dec 13 02:05:30.132935 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:05:30.133089 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:05:30.133247 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:05:30.133398 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 02:05:30.133549 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:05:30.133729 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 02:05:30.133934 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 02:05:30.134120 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 02:05:30.134298 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 02:05:30.134474 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 02:05:30.134644 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 02:05:30.135112 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 02:05:30.135596 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 02:05:30.136029 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 02:05:30.136214 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 02:05:30.136394 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 02:05:30.136565 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 02:05:30.136734 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 02:05:30.136764 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:05:30.136783 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:05:30.136801 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:05:30.136844 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:05:30.136862 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 02:05:30.136880 kernel: iommu: Default domain type: Translated Dec 13 02:05:30.136898 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:05:30.136917 kernel: vgaarb: loaded Dec 13 02:05:30.136934 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:05:30.136957 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:05:30.136975 kernel: PTP clock support registered Dec 13 02:05:30.136992 kernel: Registered efivars operations Dec 13 02:05:30.137010 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:05:30.137027 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:05:30.137045 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 02:05:30.137063 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 02:05:30.137080 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 02:05:30.137097 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 02:05:30.137119 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 02:05:30.137136 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:05:30.137154 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:05:30.137180 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:05:30.137198 kernel: pnp: PnP ACPI init Dec 13 02:05:30.137216 kernel: pnp: PnP ACPI: found 7 devices Dec 13 02:05:30.137234 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:05:30.137252 kernel: NET: Registered PF_INET protocol family Dec 13 02:05:30.137269 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:05:30.137290 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 02:05:30.137308 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:05:30.137326 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:05:30.137344 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 02:05:30.137362 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 02:05:30.137379 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:05:30.137397 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:05:30.137415 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:05:30.137436 kernel: NET: Registered PF_XDP protocol family Dec 13 02:05:30.137597 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:05:30.137751 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:05:30.138008 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:05:30.138158 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 02:05:30.138329 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:05:30.138353 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:05:30.138377 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 02:05:30.138395 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 02:05:30.138413 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:05:30.138430 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:05:30.138448 kernel: clocksource: Switched to clocksource tsc Dec 13 02:05:30.138465 kernel: Initialise system trusted keyrings Dec 13 02:05:30.138482 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 02:05:30.138499 kernel: Key type asymmetric registered Dec 13 02:05:30.138514 kernel: Asymmetric key parser 'x509' registered Dec 13 02:05:30.138534 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:05:30.138551 kernel: io scheduler mq-deadline registered Dec 13 02:05:30.138569 kernel: io scheduler kyber registered Dec 13 02:05:30.138596 kernel: io scheduler bfq registered Dec 13 02:05:30.138613 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:05:30.138632 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 02:05:30.138804 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 02:05:30.146130 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 02:05:30.146764 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 02:05:30.146801 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 02:05:30.147000 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 02:05:30.147025 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:05:30.147045 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:05:30.147063 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 02:05:30.147081 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 02:05:30.147099 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 02:05:30.147288 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 02:05:30.147320 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:05:30.147338 kernel: i8042: Warning: Keylock active Dec 13 02:05:30.147355 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:05:30.147372 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:05:30.147539 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 02:05:30.147694 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 02:05:30.147932 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T02:05:29 UTC (1734055529) Dec 13 02:05:30.148099 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 02:05:30.148129 kernel: intel_pstate: CPU model not supported Dec 13 02:05:30.148148 kernel: pstore: Registered efi as persistent store backend Dec 13 02:05:30.148174 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:05:30.148193 kernel: Segment Routing with IPv6 Dec 13 02:05:30.148211 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:05:30.148228 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:05:30.148246 kernel: Key type dns_resolver registered Dec 13 02:05:30.148263 kernel: IPI shorthand broadcast: enabled Dec 13 02:05:30.148281 kernel: sched_clock: Marking stable (725583235, 173637972)->(958952382, -59731175) Dec 13 02:05:30.148303 kernel: registered taskstats version 1 Dec 13 02:05:30.148321 kernel: Loading compiled-in X.509 certificates Dec 13 02:05:30.148339 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:05:30.148357 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:05:30.148375 kernel: Key type .fscrypt registered Dec 13 02:05:30.148393 kernel: Key type fscrypt-provisioning registered Dec 13 02:05:30.148410 kernel: pstore: Using crash dump compression: deflate Dec 13 02:05:30.148428 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:05:30.148446 kernel: ima: No architecture policies found Dec 13 02:05:30.148467 kernel: clk: Disabling unused clocks Dec 13 02:05:30.148484 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:05:30.148501 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:05:30.148519 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:05:30.148536 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:05:30.148563 kernel: Run /init as init process Dec 13 02:05:30.148581 kernel: with arguments: Dec 13 02:05:30.148598 kernel: /init Dec 13 02:05:30.148615 kernel: with environment: Dec 13 02:05:30.148637 kernel: HOME=/ Dec 13 02:05:30.148654 kernel: TERM=linux Dec 13 02:05:30.148672 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:05:30.148694 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:05:30.148716 systemd[1]: Detected virtualization kvm. Dec 13 02:05:30.148736 systemd[1]: Detected architecture x86-64. Dec 13 02:05:30.148754 systemd[1]: Running in initrd. Dec 13 02:05:30.148775 systemd[1]: No hostname configured, using default hostname. Dec 13 02:05:30.148793 systemd[1]: Hostname set to . Dec 13 02:05:30.168901 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:05:30.168936 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:05:30.168955 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:05:30.168974 systemd[1]: Reached target cryptsetup.target. Dec 13 02:05:30.168992 systemd[1]: Reached target paths.target. Dec 13 02:05:30.169009 systemd[1]: Reached target slices.target. Dec 13 02:05:30.169035 systemd[1]: Reached target swap.target. Dec 13 02:05:30.169052 systemd[1]: Reached target timers.target. Dec 13 02:05:30.169072 systemd[1]: Listening on iscsid.socket. Dec 13 02:05:30.169090 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:05:30.169108 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:05:30.169126 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:05:30.169143 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:05:30.169161 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:05:30.169192 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:05:30.169209 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:05:30.169244 systemd[1]: Reached target sockets.target. Dec 13 02:05:30.169266 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:05:30.169283 systemd[1]: Finished network-cleanup.service. Dec 13 02:05:30.169302 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:05:30.169319 systemd[1]: Starting systemd-journald.service... Dec 13 02:05:30.169341 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:05:30.169359 systemd[1]: Starting systemd-resolved.service... Dec 13 02:05:30.169377 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:05:30.169396 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:05:30.169415 kernel: audit: type=1130 audit(1734055530.125:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.169435 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:05:30.169454 kernel: audit: type=1130 audit(1734055530.137:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.169473 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:05:30.169498 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:05:30.169517 kernel: audit: type=1130 audit(1734055530.147:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.169536 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:05:30.169562 systemd-journald[190]: Journal started Dec 13 02:05:30.169673 systemd-journald[190]: Runtime Journal (/run/log/journal/c76c5c1feaf689d4eef22190433c8c4c) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:05:30.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.160647 systemd-modules-load[191]: Inserted module 'overlay' Dec 13 02:05:30.176481 systemd[1]: Started systemd-journald.service. Dec 13 02:05:30.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.182892 kernel: audit: type=1130 audit(1734055530.175:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.184184 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:05:30.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.190840 kernel: audit: type=1130 audit(1734055530.183:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.208896 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:05:30.216972 kernel: audit: type=1130 audit(1734055530.207:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.211560 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:05:30.226937 systemd-resolved[192]: Positive Trust Anchors: Dec 13 02:05:30.226960 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:05:30.227016 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:05:30.236705 systemd-resolved[192]: Defaulting to hostname 'linux'. Dec 13 02:05:30.243927 dracut-cmdline[205]: dracut-dracut-053 Dec 13 02:05:30.240635 systemd[1]: Started systemd-resolved.service. Dec 13 02:05:30.250536 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:05:30.268982 kernel: audit: type=1130 audit(1734055530.251:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.269029 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:05:30.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.253260 systemd[1]: Reached target nss-lookup.target. Dec 13 02:05:30.275219 systemd-modules-load[191]: Inserted module 'br_netfilter' Dec 13 02:05:30.280946 kernel: Bridge firewalling registered Dec 13 02:05:30.305837 kernel: SCSI subsystem initialized Dec 13 02:05:30.325836 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:05:30.325924 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:05:30.328229 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:05:30.333171 systemd-modules-load[191]: Inserted module 'dm_multipath' Dec 13 02:05:30.334875 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:05:30.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.346210 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:05:30.355974 kernel: audit: type=1130 audit(1734055530.343:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.356012 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:05:30.359992 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:05:30.369982 kernel: audit: type=1130 audit(1734055530.362:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.380849 kernel: iscsi: registered transport (tcp) Dec 13 02:05:30.407857 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:05:30.407949 kernel: QLogic iSCSI HBA Driver Dec 13 02:05:30.451844 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:05:30.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.454041 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:05:30.511869 kernel: raid6: avx2x4 gen() 18222 MB/s Dec 13 02:05:30.529853 kernel: raid6: avx2x4 xor() 6830 MB/s Dec 13 02:05:30.546840 kernel: raid6: avx2x2 gen() 18120 MB/s Dec 13 02:05:30.563846 kernel: raid6: avx2x2 xor() 18592 MB/s Dec 13 02:05:30.580851 kernel: raid6: avx2x1 gen() 13882 MB/s Dec 13 02:05:30.597847 kernel: raid6: avx2x1 xor() 16133 MB/s Dec 13 02:05:30.614848 kernel: raid6: sse2x4 gen() 11046 MB/s Dec 13 02:05:30.631851 kernel: raid6: sse2x4 xor() 6632 MB/s Dec 13 02:05:30.648846 kernel: raid6: sse2x2 gen() 12057 MB/s Dec 13 02:05:30.665851 kernel: raid6: sse2x2 xor() 7397 MB/s Dec 13 02:05:30.682853 kernel: raid6: sse2x1 gen() 10538 MB/s Dec 13 02:05:30.700293 kernel: raid6: sse2x1 xor() 5178 MB/s Dec 13 02:05:30.700328 kernel: raid6: using algorithm avx2x4 gen() 18222 MB/s Dec 13 02:05:30.700350 kernel: raid6: .... xor() 6830 MB/s, rmw enabled Dec 13 02:05:30.701162 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:05:30.716891 kernel: xor: automatically using best checksumming function avx Dec 13 02:05:30.824853 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:05:30.836694 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:05:30.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.835000 audit: BPF prog-id=7 op=LOAD Dec 13 02:05:30.835000 audit: BPF prog-id=8 op=LOAD Dec 13 02:05:30.838476 systemd[1]: Starting systemd-udevd.service... Dec 13 02:05:30.856473 systemd-udevd[388]: Using default interface naming scheme 'v252'. Dec 13 02:05:30.863954 systemd[1]: Started systemd-udevd.service. Dec 13 02:05:30.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.866410 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:05:30.890299 dracut-pre-trigger[395]: rd.md=0: removing MD RAID activation Dec 13 02:05:30.929935 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:05:30.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.932081 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:05:30.996447 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:05:30.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:31.070840 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:05:31.099278 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:05:31.099349 kernel: AES CTR mode by8 optimization enabled Dec 13 02:05:31.108834 kernel: scsi host0: Virtio SCSI HBA Dec 13 02:05:31.134840 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 02:05:31.242960 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 02:05:31.300394 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 02:05:31.300641 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 02:05:31.300905 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 02:05:31.301122 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 02:05:31.301380 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:05:31.301416 kernel: GPT:17805311 != 25165823 Dec 13 02:05:31.301439 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:05:31.301463 kernel: GPT:17805311 != 25165823 Dec 13 02:05:31.301486 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:05:31.301505 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:31.301526 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 02:05:31.352840 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (440) Dec 13 02:05:31.363956 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:05:31.388014 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:05:31.388268 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:05:31.414266 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:05:31.439450 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:05:31.450156 systemd[1]: Starting disk-uuid.service... Dec 13 02:05:31.473110 disk-uuid[518]: Primary Header is updated. Dec 13 02:05:31.473110 disk-uuid[518]: Secondary Entries is updated. Dec 13 02:05:31.473110 disk-uuid[518]: Secondary Header is updated. Dec 13 02:05:31.498937 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:31.507851 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:31.532860 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:32.525292 disk-uuid[519]: The operation has completed successfully. Dec 13 02:05:32.533960 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:32.588067 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:05:32.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:32.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:32.588204 systemd[1]: Finished disk-uuid.service. Dec 13 02:05:32.603618 systemd[1]: Starting verity-setup.service... Dec 13 02:05:32.632838 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:05:32.713730 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:05:32.728299 systemd[1]: Finished verity-setup.service. Dec 13 02:05:32.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:32.729655 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:05:32.830839 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:05:32.831569 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:05:32.832011 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:05:32.879995 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:05:32.880035 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:05:32.880059 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:05:32.832958 systemd[1]: Starting ignition-setup.service... Dec 13 02:05:32.901973 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:05:32.845184 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:05:32.905981 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:05:32.921342 systemd[1]: Finished ignition-setup.service. Dec 13 02:05:32.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:32.923201 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:05:32.979446 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:05:32.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:32.978000 audit: BPF prog-id=9 op=LOAD Dec 13 02:05:32.981649 systemd[1]: Starting systemd-networkd.service... Dec 13 02:05:33.016317 systemd-networkd[693]: lo: Link UP Dec 13 02:05:33.016332 systemd-networkd[693]: lo: Gained carrier Dec 13 02:05:33.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.017153 systemd-networkd[693]: Enumeration completed Dec 13 02:05:33.017299 systemd[1]: Started systemd-networkd.service. Dec 13 02:05:33.017712 systemd-networkd[693]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:05:33.020657 systemd-networkd[693]: eth0: Link UP Dec 13 02:05:33.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.020666 systemd-networkd[693]: eth0: Gained carrier Dec 13 02:05:33.101987 iscsid[702]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:05:33.101987 iscsid[702]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 02:05:33.101987 iscsid[702]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:05:33.101987 iscsid[702]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:05:33.101987 iscsid[702]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:05:33.101987 iscsid[702]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:05:33.101987 iscsid[702]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:05:33.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.030994 systemd-networkd[693]: eth0: DHCPv4 address 10.128.0.29/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:05:33.231144 ignition[639]: Ignition 2.14.0 Dec 13 02:05:33.032436 systemd[1]: Reached target network.target. Dec 13 02:05:33.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.231158 ignition[639]: Stage: fetch-offline Dec 13 02:05:33.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.042017 systemd[1]: Starting iscsiuio.service... Dec 13 02:05:33.231236 ignition[639]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:33.063255 systemd[1]: Started iscsiuio.service. Dec 13 02:05:33.231277 ignition[639]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:33.088689 systemd[1]: Starting iscsid.service... Dec 13 02:05:33.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.254090 ignition[639]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:33.109134 systemd[1]: Started iscsid.service. Dec 13 02:05:33.254662 ignition[639]: parsed url from cmdline: "" Dec 13 02:05:33.128795 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:05:33.254671 ignition[639]: no config URL provided Dec 13 02:05:33.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.161372 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:05:33.254694 ignition[639]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:05:33.197162 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:05:33.254718 ignition[639]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:05:33.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.197387 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:05:33.254732 ignition[639]: failed to fetch config: resource requires networking Dec 13 02:05:33.232003 systemd[1]: Reached target remote-fs.target. Dec 13 02:05:33.266169 ignition[639]: Ignition finished successfully Dec 13 02:05:33.251584 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:05:33.310962 ignition[717]: Ignition 2.14.0 Dec 13 02:05:33.270415 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:05:33.310973 ignition[717]: Stage: fetch Dec 13 02:05:33.276378 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:05:33.311098 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:33.299377 systemd[1]: Starting ignition-fetch.service... Dec 13 02:05:33.311128 ignition[717]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:33.333787 unknown[717]: fetched base config from "system" Dec 13 02:05:33.321025 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:33.333796 unknown[717]: fetched base config from "system" Dec 13 02:05:33.321340 ignition[717]: parsed url from cmdline: "" Dec 13 02:05:33.333804 unknown[717]: fetched user config from "gcp" Dec 13 02:05:33.321348 ignition[717]: no config URL provided Dec 13 02:05:33.335935 systemd[1]: Finished ignition-fetch.service. Dec 13 02:05:33.321358 ignition[717]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:05:33.346370 systemd[1]: Starting ignition-kargs.service... Dec 13 02:05:33.321375 ignition[717]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:05:33.374449 systemd[1]: Finished ignition-kargs.service. Dec 13 02:05:33.321424 ignition[717]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 02:05:33.383545 systemd[1]: Starting ignition-disks.service... Dec 13 02:05:33.330563 ignition[717]: GET result: OK Dec 13 02:05:33.419365 systemd[1]: Finished ignition-disks.service. Dec 13 02:05:33.330635 ignition[717]: parsing config with SHA512: e1cd8bea6380b6c4e53e42f242a85394f28fcea37d0f29d2f316d0560b669e89fb62d684fd272c9b550cd0c3d3d532577aca58318194bf5eccf58b44e4d1091b Dec 13 02:05:33.435270 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:05:33.334286 ignition[717]: fetch: fetch complete Dec 13 02:05:33.450987 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:05:33.334293 ignition[717]: fetch: fetch passed Dec 13 02:05:33.464978 systemd[1]: Reached target local-fs.target. Dec 13 02:05:33.334344 ignition[717]: Ignition finished successfully Dec 13 02:05:33.465109 systemd[1]: Reached target sysinit.target. Dec 13 02:05:33.358908 ignition[723]: Ignition 2.14.0 Dec 13 02:05:33.487981 systemd[1]: Reached target basic.target. Dec 13 02:05:33.358924 ignition[723]: Stage: kargs Dec 13 02:05:33.502229 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:05:33.359049 ignition[723]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:33.359090 ignition[723]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:33.370933 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:33.372144 ignition[723]: kargs: kargs passed Dec 13 02:05:33.372192 ignition[723]: Ignition finished successfully Dec 13 02:05:33.395288 ignition[729]: Ignition 2.14.0 Dec 13 02:05:33.395299 ignition[729]: Stage: disks Dec 13 02:05:33.395482 ignition[729]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:33.395524 ignition[729]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:33.408183 ignition[729]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:33.409616 ignition[729]: disks: disks passed Dec 13 02:05:33.409676 ignition[729]: Ignition finished successfully Dec 13 02:05:33.544695 systemd-fsck[737]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 02:05:33.762825 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:05:33.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:33.772106 systemd[1]: Mounting sysroot.mount... Dec 13 02:05:33.797842 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:05:33.802160 systemd[1]: Mounted sysroot.mount. Dec 13 02:05:33.809145 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:05:33.827578 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:05:33.832648 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:05:33.832697 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:05:33.832732 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:05:33.911936 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (743) Dec 13 02:05:33.911978 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:05:33.912001 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:05:33.912023 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:05:33.844632 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:05:33.930005 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:05:33.874895 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:05:33.938204 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:05:33.955179 initrd-setup-root[766]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:05:33.971958 initrd-setup-root[774]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:05:33.965158 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:05:33.999031 initrd-setup-root[782]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:05:34.009953 initrd-setup-root[790]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:05:34.044420 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:05:34.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.045715 systemd[1]: Starting ignition-mount.service... Dec 13 02:05:34.067109 systemd[1]: Starting sysroot-boot.service... Dec 13 02:05:34.081371 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 02:05:34.081594 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 02:05:34.106995 ignition[809]: INFO : Ignition 2.14.0 Dec 13 02:05:34.106995 ignition[809]: INFO : Stage: mount Dec 13 02:05:34.106995 ignition[809]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:34.106995 ignition[809]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:34.244010 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 02:05:34.244044 kernel: audit: type=1130 audit(1734055534.113:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.244074 kernel: audit: type=1130 audit(1734055534.159:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.244093 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (818) Dec 13 02:05:34.244108 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:05:34.244123 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:05:34.244136 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:05:34.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.106979 systemd[1]: Finished sysroot-boot.service. Dec 13 02:05:34.258017 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:05:34.258102 ignition[809]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:34.258102 ignition[809]: INFO : mount: mount passed Dec 13 02:05:34.258102 ignition[809]: INFO : Ignition finished successfully Dec 13 02:05:34.115368 systemd[1]: Finished ignition-mount.service. Dec 13 02:05:34.162568 systemd[1]: Starting ignition-files.service... Dec 13 02:05:34.183015 systemd-networkd[693]: eth0: Gained IPv6LL Dec 13 02:05:34.319986 ignition[837]: INFO : Ignition 2.14.0 Dec 13 02:05:34.319986 ignition[837]: INFO : Stage: files Dec 13 02:05:34.319986 ignition[837]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:34.319986 ignition[837]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:34.319986 ignition[837]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:34.319986 ignition[837]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:05:34.319986 ignition[837]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:05:34.319986 ignition[837]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:05:34.319986 ignition[837]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:05:34.319986 ignition[837]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:05:34.319986 ignition[837]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:05:34.319986 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 02:05:34.319986 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:05:34.487951 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (841) Dec 13 02:05:34.196198 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4236959980" Dec 13 02:05:34.497001 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4236959980": device or resource busy Dec 13 02:05:34.497001 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4236959980", trying btrfs: device or resource busy Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4236959980" Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4236959980" Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem4236959980" Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem4236959980" Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1825282842" Dec 13 02:05:34.497001 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1825282842": device or resource busy Dec 13 02:05:34.497001 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1825282842", trying btrfs: device or resource busy Dec 13 02:05:34.497001 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1825282842" Dec 13 02:05:34.268262 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1825282842" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem1825282842" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem1825282842" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:05:34.748084 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2355431019" Dec 13 02:05:34.748084 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2355431019": device or resource busy Dec 13 02:05:34.315484 unknown[837]: wrote ssh authorized keys file for user: core Dec 13 02:05:34.994016 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2355431019", trying btrfs: device or resource busy Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2355431019" Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2355431019" Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2355431019" Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2355431019" Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4179150755" Dec 13 02:05:34.994016 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4179150755": device or resource busy Dec 13 02:05:34.994016 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4179150755", trying btrfs: device or resource busy Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4179150755" Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4179150755" Dec 13 02:05:34.994016 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem4179150755" Dec 13 02:05:35.278104 kernel: audit: type=1130 audit(1734055535.187:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.185029 systemd[1]: Finished ignition-files.service. Dec 13 02:05:35.317026 kernel: audit: type=1130 audit(1734055535.286:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.317158 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem4179150755" Dec 13 02:05:35.317158 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:05:35.317158 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 02:05:35.317158 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK Dec 13 02:05:35.317158 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(17): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(17): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(18): [started] processing unit "oem-gce.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(18): [finished] processing unit "oem-gce.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(19): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(19): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(1a): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(1a): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(1b): [started] setting preset to enabled for "oem-gce.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(1b): [finished] setting preset to enabled for "oem-gce.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(1c): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: op(1c): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:05:35.317158 ignition[837]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:05:35.786999 kernel: audit: type=1130 audit(1734055535.323:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.787067 kernel: audit: type=1131 audit(1734055535.323:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.787092 kernel: audit: type=1130 audit(1734055535.455:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.787115 kernel: audit: type=1131 audit(1734055535.455:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.787137 kernel: audit: type=1130 audit(1734055535.608:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.787152 kernel: audit: type=1131 audit(1734055535.749:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.198636 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:05:35.804002 ignition[837]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:05:35.804002 ignition[837]: INFO : files: files passed Dec 13 02:05:35.804002 ignition[837]: INFO : Ignition finished successfully Dec 13 02:05:35.839144 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:05:35.239020 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:05:35.240232 systemd[1]: Starting ignition-quench.service... Dec 13 02:05:35.263359 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:05:35.288428 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:05:35.288595 systemd[1]: Finished ignition-quench.service. Dec 13 02:05:35.325338 systemd[1]: Reached target ignition-complete.target. Dec 13 02:05:35.405286 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:05:35.442958 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:05:35.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.443126 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:05:35.457156 systemd[1]: Reached target initrd-fs.target. Dec 13 02:05:35.544111 systemd[1]: Reached target initrd.target. Dec 13 02:05:36.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.557230 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:05:36.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.558537 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:05:36.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.581283 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:05:36.093996 ignition[875]: INFO : Ignition 2.14.0 Dec 13 02:05:36.093996 ignition[875]: INFO : Stage: umount Dec 13 02:05:36.093996 ignition[875]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:36.093996 ignition[875]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:36.093996 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:36.093996 ignition[875]: INFO : umount: umount passed Dec 13 02:05:36.093996 ignition[875]: INFO : Ignition finished successfully Dec 13 02:05:36.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.195271 iscsid[702]: iscsid shutting down. Dec 13 02:05:36.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.611581 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:05:36.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.649563 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:05:36.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.680263 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:05:36.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.693422 systemd[1]: Stopped target timers.target. Dec 13 02:05:36.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.711495 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:05:36.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.711734 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:05:36.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.751533 systemd[1]: Stopped target initrd.target. Dec 13 02:05:35.794297 systemd[1]: Stopped target basic.target. Dec 13 02:05:35.804342 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:05:35.825383 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:05:35.854314 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:05:35.877295 systemd[1]: Stopped target remote-fs.target. Dec 13 02:05:35.902262 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:05:36.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.917306 systemd[1]: Stopped target sysinit.target. Dec 13 02:05:36.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.933264 systemd[1]: Stopped target local-fs.target. Dec 13 02:05:35.949312 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:05:35.964301 systemd[1]: Stopped target swap.target. Dec 13 02:05:36.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.979214 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:05:36.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.979408 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:05:35.987486 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:05:36.010250 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:05:36.010486 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:05:36.031416 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:05:36.031641 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:05:36.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.048253 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:05:36.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.545000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:05:36.048476 systemd[1]: Stopped ignition-files.service. Dec 13 02:05:36.068690 systemd[1]: Stopping ignition-mount.service... Dec 13 02:05:36.086536 systemd[1]: Stopping iscsid.service... Dec 13 02:05:36.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.100960 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:05:36.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.101319 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:05:36.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.122869 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:05:36.132174 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:05:36.132503 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:05:36.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.156394 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:05:36.156594 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:05:36.191501 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:05:36.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.192713 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:05:36.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.192862 systemd[1]: Stopped iscsid.service. Dec 13 02:05:36.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.202845 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:05:36.202963 systemd[1]: Stopped ignition-mount.service. Dec 13 02:05:36.217706 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:05:36.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.217847 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:05:36.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.231799 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:05:36.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.231989 systemd[1]: Stopped ignition-disks.service. Dec 13 02:05:36.246096 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:05:36.246183 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:05:36.262099 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 02:05:36.262191 systemd[1]: Stopped ignition-fetch.service. Dec 13 02:05:36.277099 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:05:36.277181 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:05:36.898985 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Dec 13 02:05:36.293094 systemd[1]: Stopped target paths.target. Dec 13 02:05:36.306009 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:05:36.309937 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:05:36.321077 systemd[1]: Stopped target slices.target. Dec 13 02:05:36.328277 systemd[1]: Stopped target sockets.target. Dec 13 02:05:36.356180 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:05:36.356242 systemd[1]: Closed iscsid.socket. Dec 13 02:05:36.364214 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:05:36.364289 systemd[1]: Stopped ignition-setup.service. Dec 13 02:05:36.377270 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:05:36.377340 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:05:36.399316 systemd[1]: Stopping iscsiuio.service... Dec 13 02:05:36.413519 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:05:36.413640 systemd[1]: Stopped iscsiuio.service. Dec 13 02:05:36.433617 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:05:36.433732 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:05:36.449105 systemd[1]: Stopped target network.target. Dec 13 02:05:36.464117 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:05:36.464180 systemd[1]: Closed iscsiuio.socket. Dec 13 02:05:36.478304 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:05:36.481881 systemd-networkd[693]: eth0: DHCPv6 lease lost Dec 13 02:05:36.493265 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:05:36.501575 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:05:36.501699 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:05:36.531837 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:05:36.531985 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:05:36.547763 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:05:36.547831 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:05:36.564126 systemd[1]: Stopping network-cleanup.service... Dec 13 02:05:36.577964 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:05:36.578087 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:05:36.593122 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:05:36.593197 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:05:36.608231 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:05:36.608302 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:05:36.626249 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:05:36.641846 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:05:36.642499 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:05:36.642647 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:05:36.663517 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:05:36.663603 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:05:36.678169 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:05:36.678224 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:05:36.697097 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:05:36.697175 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:05:36.712229 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:05:36.712304 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:05:36.728204 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:05:36.728276 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:05:36.745146 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:05:36.769074 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:05:36.769196 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:05:36.784736 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:05:36.784886 systemd[1]: Stopped network-cleanup.service. Dec 13 02:05:36.801461 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:05:36.801577 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:05:36.816335 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:05:36.833155 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:05:36.861228 systemd[1]: Switching root. Dec 13 02:05:36.901464 systemd-journald[190]: Journal stopped Dec 13 02:05:41.598753 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:05:41.598886 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:05:41.598923 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:05:41.598955 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:05:41.598978 kernel: SELinux: policy capability open_perms=1 Dec 13 02:05:41.599001 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:05:41.599031 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:05:41.599061 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:05:41.599091 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:05:41.599114 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:05:41.599142 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:05:41.599168 systemd[1]: Successfully loaded SELinux policy in 111.387ms. Dec 13 02:05:41.599208 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.400ms. Dec 13 02:05:41.599233 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:05:41.599258 systemd[1]: Detected virtualization kvm. Dec 13 02:05:41.599280 systemd[1]: Detected architecture x86-64. Dec 13 02:05:41.599302 systemd[1]: Detected first boot. Dec 13 02:05:41.599325 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:05:41.599351 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:05:41.599379 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:05:41.599404 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:05:41.599429 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:05:41.599456 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:05:41.599485 kernel: kauditd_printk_skb: 50 callbacks suppressed Dec 13 02:05:41.599510 kernel: audit: type=1334 audit(1734055540.665:88): prog-id=12 op=LOAD Dec 13 02:05:41.599538 kernel: audit: type=1334 audit(1734055540.665:89): prog-id=3 op=UNLOAD Dec 13 02:05:41.599566 kernel: audit: type=1334 audit(1734055540.671:90): prog-id=13 op=LOAD Dec 13 02:05:41.599587 kernel: audit: type=1334 audit(1734055540.678:91): prog-id=14 op=LOAD Dec 13 02:05:41.599610 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:05:41.599631 kernel: audit: type=1334 audit(1734055540.678:92): prog-id=4 op=UNLOAD Dec 13 02:05:41.599651 kernel: audit: type=1334 audit(1734055540.678:93): prog-id=5 op=UNLOAD Dec 13 02:05:41.599674 kernel: audit: type=1131 audit(1734055540.680:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.599696 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:05:41.599719 kernel: audit: type=1334 audit(1734055540.748:95): prog-id=12 op=UNLOAD Dec 13 02:05:41.599743 kernel: audit: type=1130 audit(1734055540.764:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.599771 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:05:41.599796 kernel: audit: type=1131 audit(1734055540.764:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.599866 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:05:41.599890 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:05:41.599915 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 02:05:41.599940 systemd[1]: Created slice system-getty.slice. Dec 13 02:05:41.599966 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:05:41.599987 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:05:41.600010 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:05:41.600033 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:05:41.600067 systemd[1]: Created slice user.slice. Dec 13 02:05:41.600089 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:05:41.600112 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:05:41.600134 systemd[1]: Set up automount boot.automount. Dec 13 02:05:41.600156 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:05:41.600182 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:05:41.600204 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:05:41.600227 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:05:41.600251 systemd[1]: Reached target integritysetup.target. Dec 13 02:05:41.600274 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:05:41.600304 systemd[1]: Reached target remote-fs.target. Dec 13 02:05:41.600327 systemd[1]: Reached target slices.target. Dec 13 02:05:41.600350 systemd[1]: Reached target swap.target. Dec 13 02:05:41.600372 systemd[1]: Reached target torcx.target. Dec 13 02:05:41.600395 systemd[1]: Reached target veritysetup.target. Dec 13 02:05:41.600423 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:05:41.600445 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:05:41.600468 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:05:41.600491 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:05:41.600516 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:05:41.600539 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:05:41.600570 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:05:41.600596 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:05:41.600620 systemd[1]: Mounting media.mount... Dec 13 02:05:41.600650 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:41.600675 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:05:41.600700 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:05:41.600725 systemd[1]: Mounting tmp.mount... Dec 13 02:05:41.600751 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:05:41.600775 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:05:41.600800 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:05:41.600841 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:05:41.600866 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:05:41.600894 systemd[1]: Starting modprobe@drm.service... Dec 13 02:05:41.600919 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:05:41.600944 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:05:41.600966 systemd[1]: Starting modprobe@loop.service... Dec 13 02:05:41.600988 kernel: fuse: init (API version 7.34) Dec 13 02:05:41.601008 kernel: loop: module loaded Dec 13 02:05:41.601029 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:05:41.601052 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:05:41.601086 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:05:41.601117 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:05:41.601140 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:05:41.601162 systemd[1]: Stopped systemd-journald.service. Dec 13 02:05:41.601183 systemd[1]: Starting systemd-journald.service... Dec 13 02:05:41.601206 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:05:41.601227 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:05:41.601256 systemd-journald[999]: Journal started Dec 13 02:05:41.601348 systemd-journald[999]: Runtime Journal (/run/log/journal/c76c5c1feaf689d4eef22190433c8c4c) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:05:36.900000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:05:37.205000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:05:37.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:05:37.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:05:37.359000 audit: BPF prog-id=10 op=LOAD Dec 13 02:05:37.359000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:05:37.359000 audit: BPF prog-id=11 op=LOAD Dec 13 02:05:37.359000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:05:37.535000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:05:37.535000 audit[908]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018e7d2 a1=c00018aa80 a2=c00019ccc0 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:37.535000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:05:37.546000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:05:37.546000 audit[908]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018e8a9 a2=1ed a3=0 items=2 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:37.546000 audit: CWD cwd="/" Dec 13 02:05:37.546000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:37.546000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:37.546000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:05:40.665000 audit: BPF prog-id=12 op=LOAD Dec 13 02:05:40.665000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:05:40.671000 audit: BPF prog-id=13 op=LOAD Dec 13 02:05:40.678000 audit: BPF prog-id=14 op=LOAD Dec 13 02:05:40.678000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:05:40.678000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:05:40.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.748000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:05:40.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.549000 audit: BPF prog-id=15 op=LOAD Dec 13 02:05:41.549000 audit: BPF prog-id=16 op=LOAD Dec 13 02:05:41.549000 audit: BPF prog-id=17 op=LOAD Dec 13 02:05:41.549000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:05:41.549000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:05:41.593000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:05:41.593000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd8bde36b0 a2=4000 a3=7ffd8bde374c items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:41.593000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:05:40.664962 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:05:37.531400 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:05:40.681366 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:05:37.532802 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:05:37.532864 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:05:37.532918 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:05:37.532940 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:05:37.532997 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:05:37.533024 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:05:37.533332 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:05:37.533426 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:05:37.533450 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:05:37.535403 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:05:37.535476 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:05:37.535524 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:05:37.535554 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:05:37.535588 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:05:37.535629 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:05:40.047666 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:05:40.048136 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:05:40.048345 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:05:40.048898 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:05:40.049069 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:05:40.049221 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-12-13T02:05:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:05:41.608561 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:05:41.624254 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:05:41.637835 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:05:41.637926 systemd[1]: Stopped verity-setup.service. Dec 13 02:05:41.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.662845 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:41.671849 systemd[1]: Started systemd-journald.service. Dec 13 02:05:41.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.681297 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:05:41.688221 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:05:41.695177 systemd[1]: Mounted media.mount. Dec 13 02:05:41.703180 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:05:41.712159 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:05:41.721146 systemd[1]: Mounted tmp.mount. Dec 13 02:05:41.728326 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:05:41.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.737404 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:05:41.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.746439 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:05:41.746658 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:05:41.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.755451 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:05:41.755665 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:05:41.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.764427 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:05:41.764644 systemd[1]: Finished modprobe@drm.service. Dec 13 02:05:41.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.773389 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:05:41.773598 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:05:41.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.782364 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:05:41.782566 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:05:41.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.791320 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:05:41.791529 systemd[1]: Finished modprobe@loop.service. Dec 13 02:05:41.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.800395 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:05:41.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.809320 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:05:41.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.818337 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:05:41.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.827459 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:05:41.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.836721 systemd[1]: Reached target network-pre.target. Dec 13 02:05:41.846494 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:05:41.856327 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:05:41.862971 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:05:41.866132 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:05:41.874890 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:05:41.881094 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:05:41.882853 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:05:41.886771 systemd-journald[999]: Time spent on flushing to /var/log/journal/c76c5c1feaf689d4eef22190433c8c4c is 77.452ms for 1132 entries. Dec 13 02:05:41.886771 systemd-journald[999]: System Journal (/var/log/journal/c76c5c1feaf689d4eef22190433c8c4c) is 8.0M, max 584.8M, 576.8M free. Dec 13 02:05:41.987103 systemd-journald[999]: Received client request to flush runtime journal. Dec 13 02:05:41.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.899035 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:05:41.901860 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:05:41.910764 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:05:41.919621 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:05:41.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:41.930440 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:05:41.939172 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:05:41.988881 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 02:05:41.948649 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:05:41.960777 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:05:41.969269 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:05:41.979474 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:05:41.990153 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:05:41.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:42.575555 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:05:42.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:42.582000 audit: BPF prog-id=18 op=LOAD Dec 13 02:05:42.583000 audit: BPF prog-id=19 op=LOAD Dec 13 02:05:42.583000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:05:42.583000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:05:42.585861 systemd[1]: Starting systemd-udevd.service... Dec 13 02:05:42.609942 systemd-udevd[1016]: Using default interface naming scheme 'v252'. Dec 13 02:05:42.658932 systemd[1]: Started systemd-udevd.service. Dec 13 02:05:42.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:42.668000 audit: BPF prog-id=20 op=LOAD Dec 13 02:05:42.671161 systemd[1]: Starting systemd-networkd.service... Dec 13 02:05:42.685000 audit: BPF prog-id=21 op=LOAD Dec 13 02:05:42.686000 audit: BPF prog-id=22 op=LOAD Dec 13 02:05:42.686000 audit: BPF prog-id=23 op=LOAD Dec 13 02:05:42.689167 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:05:42.751308 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:05:42.771547 systemd[1]: Started systemd-userdbd.service. Dec 13 02:05:42.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:42.850850 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1030) Dec 13 02:05:42.896889 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:05:42.943705 systemd-networkd[1029]: lo: Link UP Dec 13 02:05:42.943724 systemd-networkd[1029]: lo: Gained carrier Dec 13 02:05:42.944498 systemd-networkd[1029]: Enumeration completed Dec 13 02:05:42.944640 systemd[1]: Started systemd-networkd.service. Dec 13 02:05:42.944978 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:05:42.947184 systemd-networkd[1029]: eth0: Link UP Dec 13 02:05:42.947201 systemd-networkd[1029]: eth0: Gained carrier Dec 13 02:05:42.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:42.957005 systemd-networkd[1029]: eth0: DHCPv4 address 10.128.0.29/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:05:42.964853 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:05:42.984996 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:05:42.997837 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 02:05:43.008885 kernel: EDAC MC: Ver: 3.0.0 Dec 13 02:05:42.980000 audit[1024]: AVC avc: denied { confidentiality } for pid=1024 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:05:42.980000 audit[1024]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5619a38242f0 a1=337fc a2=7f360f8aabc5 a3=5 items=110 ppid=1016 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:42.980000 audit: CWD cwd="/" Dec 13 02:05:42.980000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=1 name=(null) inode=13879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=2 name=(null) inode=13879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=3 name=(null) inode=13880 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=4 name=(null) inode=13879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=5 name=(null) inode=13881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=6 name=(null) inode=13879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=7 name=(null) inode=13882 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=8 name=(null) inode=13882 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=9 name=(null) inode=13883 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=10 name=(null) inode=13882 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=11 name=(null) inode=13884 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=12 name=(null) inode=13882 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=13 name=(null) inode=13885 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=14 name=(null) inode=13882 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=15 name=(null) inode=13886 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=16 name=(null) inode=13882 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=17 name=(null) inode=13887 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=18 name=(null) inode=13879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=19 name=(null) inode=13888 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=20 name=(null) inode=13888 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=21 name=(null) inode=13889 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=22 name=(null) inode=13888 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=23 name=(null) inode=13890 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=24 name=(null) inode=13888 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=25 name=(null) inode=13891 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=26 name=(null) inode=13888 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=27 name=(null) inode=13892 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=28 name=(null) inode=13888 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=29 name=(null) inode=13893 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=30 name=(null) inode=13879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=31 name=(null) inode=13894 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=32 name=(null) inode=13894 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=33 name=(null) inode=13895 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=34 name=(null) inode=13894 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=35 name=(null) inode=13896 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=36 name=(null) inode=13894 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=37 name=(null) inode=13897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=38 name=(null) inode=13894 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=39 name=(null) inode=13898 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=40 name=(null) inode=13894 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=41 name=(null) inode=13899 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=42 name=(null) inode=13879 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=43 name=(null) inode=13900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=44 name=(null) inode=13900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=45 name=(null) inode=13901 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=46 name=(null) inode=13900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=47 name=(null) inode=13902 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=48 name=(null) inode=13900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=49 name=(null) inode=13903 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=50 name=(null) inode=13900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=51 name=(null) inode=13904 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=52 name=(null) inode=13900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=53 name=(null) inode=13905 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=55 name=(null) inode=13906 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=56 name=(null) inode=13906 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=57 name=(null) inode=13907 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=58 name=(null) inode=13906 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=59 name=(null) inode=13908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=60 name=(null) inode=13906 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=61 name=(null) inode=13909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=62 name=(null) inode=13909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=63 name=(null) inode=13910 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=64 name=(null) inode=13909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=65 name=(null) inode=13911 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=66 name=(null) inode=13909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=67 name=(null) inode=13912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=68 name=(null) inode=13909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=69 name=(null) inode=13913 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=70 name=(null) inode=13909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=71 name=(null) inode=13914 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=72 name=(null) inode=13906 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=73 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=74 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=75 name=(null) inode=13917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=76 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=77 name=(null) inode=13918 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=78 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=79 name=(null) inode=13919 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=80 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=81 name=(null) inode=13920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=82 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=83 name=(null) inode=13921 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=84 name=(null) inode=13906 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=85 name=(null) inode=13922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=86 name=(null) inode=13922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=87 name=(null) inode=13923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=88 name=(null) inode=13922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=89 name=(null) inode=13924 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=90 name=(null) inode=13922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=91 name=(null) inode=13925 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=92 name=(null) inode=13922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=93 name=(null) inode=13926 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=94 name=(null) inode=13922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=95 name=(null) inode=13927 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=96 name=(null) inode=13906 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=97 name=(null) inode=13928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=98 name=(null) inode=13928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=99 name=(null) inode=13929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=100 name=(null) inode=13928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=101 name=(null) inode=13930 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=102 name=(null) inode=13928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=103 name=(null) inode=13931 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=104 name=(null) inode=13928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=105 name=(null) inode=13932 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=106 name=(null) inode=13928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=107 name=(null) inode=13933 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PATH item=109 name=(null) inode=13934 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:42.980000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:05:43.036872 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 02:05:43.039555 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 02:05:43.064873 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 02:05:43.078863 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:05:43.094382 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:05:43.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.104659 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:05:43.132221 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:05:43.165206 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:05:43.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.174169 systemd[1]: Reached target cryptsetup.target. Dec 13 02:05:43.184438 systemd[1]: Starting lvm2-activation.service... Dec 13 02:05:43.190431 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:05:43.223300 systemd[1]: Finished lvm2-activation.service. Dec 13 02:05:43.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.232196 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:05:43.241009 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:05:43.241067 systemd[1]: Reached target local-fs.target. Dec 13 02:05:43.250006 systemd[1]: Reached target machines.target. Dec 13 02:05:43.259528 systemd[1]: Starting ldconfig.service... Dec 13 02:05:43.267968 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:05:43.268059 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:43.269836 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:05:43.278566 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:05:43.290820 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:05:43.292973 systemd[1]: Starting systemd-sysext.service... Dec 13 02:05:43.293758 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1052 (bootctl) Dec 13 02:05:43.295736 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:05:43.321932 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:05:43.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.323145 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:05:43.332171 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:05:43.332459 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:05:43.353865 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 02:05:43.448674 systemd-fsck[1064]: fsck.fat 4.2 (2021-01-31) Dec 13 02:05:43.448674 systemd-fsck[1064]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 02:05:43.453445 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:05:43.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.465925 systemd[1]: Mounting boot.mount... Dec 13 02:05:43.510514 systemd[1]: Mounted boot.mount. Dec 13 02:05:43.537727 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:05:43.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.547159 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:05:43.547954 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:05:43.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.565833 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:05:43.588845 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 02:05:43.612958 (sd-sysext)[1068]: Using extensions 'kubernetes'. Dec 13 02:05:43.615318 (sd-sysext)[1068]: Merged extensions into '/usr'. Dec 13 02:05:43.639986 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:43.642654 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:05:43.651173 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:05:43.653964 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:05:43.662630 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:05:43.671698 systemd[1]: Starting modprobe@loop.service... Dec 13 02:05:43.679004 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:05:43.679240 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:43.679459 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:43.683547 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:05:43.691481 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:05:43.691696 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:05:43.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.700743 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:05:43.700983 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:05:43.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.710580 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:05:43.710737 systemd[1]: Finished modprobe@loop.service. Dec 13 02:05:43.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.720018 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:05:43.720230 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:05:43.721924 systemd[1]: Finished systemd-sysext.service. Dec 13 02:05:43.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:43.731654 systemd[1]: Starting ensure-sysext.service... Dec 13 02:05:43.740694 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:05:43.753705 systemd[1]: Reloading. Dec 13 02:05:43.787741 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:05:43.801624 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:05:43.814670 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:05:43.903596 /usr/lib/systemd/system-generators/torcx-generator[1095]: time="2024-12-13T02:05:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:05:43.907952 /usr/lib/systemd/system-generators/torcx-generator[1095]: time="2024-12-13T02:05:43Z" level=info msg="torcx already run" Dec 13 02:05:43.959093 ldconfig[1051]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:05:44.064638 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:05:44.064673 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:05:44.104162 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:05:44.181000 audit: BPF prog-id=24 op=LOAD Dec 13 02:05:44.181000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:05:44.183000 audit: BPF prog-id=25 op=LOAD Dec 13 02:05:44.183000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:05:44.183000 audit: BPF prog-id=26 op=LOAD Dec 13 02:05:44.183000 audit: BPF prog-id=27 op=LOAD Dec 13 02:05:44.183000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:05:44.183000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:05:44.184000 audit: BPF prog-id=28 op=LOAD Dec 13 02:05:44.184000 audit: BPF prog-id=29 op=LOAD Dec 13 02:05:44.184000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:05:44.184000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:05:44.185000 audit: BPF prog-id=30 op=LOAD Dec 13 02:05:44.185000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:05:44.185000 audit: BPF prog-id=31 op=LOAD Dec 13 02:05:44.185000 audit: BPF prog-id=32 op=LOAD Dec 13 02:05:44.185000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:05:44.185000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:05:44.193599 systemd[1]: Finished ldconfig.service. Dec 13 02:05:44.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.202769 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:05:44.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.217064 systemd[1]: Starting audit-rules.service... Dec 13 02:05:44.225794 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:05:44.234486 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:05:44.245586 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:05:44.253000 audit: BPF prog-id=33 op=LOAD Dec 13 02:05:44.257007 systemd[1]: Starting systemd-resolved.service... Dec 13 02:05:44.263000 audit: BPF prog-id=34 op=LOAD Dec 13 02:05:44.267206 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:05:44.276743 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:05:44.287034 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:05:44.287988 systemd-networkd[1029]: eth0: Gained IPv6LL Dec 13 02:05:44.286000 audit[1164]: SYSTEM_BOOT pid=1164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.296630 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:05:44.296914 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:05:44.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.305634 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:05:44.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.305000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:05:44.305000 audit[1169]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff19435ac0 a2=420 a3=0 items=0 ppid=1139 pid=1169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:44.305000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:05:44.307677 augenrules[1169]: No rules Dec 13 02:05:44.315520 systemd[1]: Finished audit-rules.service. Dec 13 02:05:44.328888 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:05:44.331411 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:05:44.341240 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:05:44.350546 systemd[1]: Starting modprobe@loop.service... Dec 13 02:05:44.360136 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:05:44.365497 enable-oslogin[1177]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:05:44.369048 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:05:44.369460 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:44.373016 systemd[1]: Starting systemd-update-done.service... Dec 13 02:05:44.380428 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:05:44.388006 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:05:44.388974 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:05:44.397120 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:05:44.397357 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:05:44.404904 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:05:44.405114 systemd[1]: Finished modprobe@loop.service. Dec 13 02:05:44.412107 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:05:44.412343 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:05:44.421914 systemd[1]: Finished systemd-update-done.service. Dec 13 02:05:44.430677 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:44.431006 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:05:44.431267 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:05:44.431454 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:44.433638 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:05:44.445287 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:44.445715 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:05:44.448362 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:05:44.456954 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:05:44.466056 systemd[1]: Starting modprobe@loop.service... Dec 13 02:05:44.470117 systemd-resolved[1155]: Positive Trust Anchors: Dec 13 02:05:44.470138 systemd-resolved[1155]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:05:44.470190 systemd-resolved[1155]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:05:44.475036 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:05:44.480853 enable-oslogin[1182]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:05:44.484010 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:05:44.484287 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:44.484490 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:05:44.484651 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:44.486965 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:05:44.487215 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:05:44.489207 systemd-resolved[1155]: Defaulting to hostname 'linux'. Dec 13 02:05:44.496513 systemd[1]: Started systemd-resolved.service. Dec 13 02:05:44.505605 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:05:44.505804 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:05:44.514718 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:05:44.514961 systemd[1]: Finished modprobe@loop.service. Dec 13 02:05:44.991651 systemd-resolved[1155]: Clock change detected. Flushing caches. Dec 13 02:05:44.991753 systemd-timesyncd[1159]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 02:05:44.991827 systemd-timesyncd[1159]: Initial clock synchronization to Fri 2024-12-13 02:05:44.991584 UTC. Dec 13 02:05:44.992323 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:05:45.001927 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:05:45.002210 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:05:45.011771 systemd[1]: Reached target network.target. Dec 13 02:05:45.020073 systemd[1]: Reached target nss-lookup.target. Dec 13 02:05:45.029037 systemd[1]: Reached target time-set.target. Dec 13 02:05:45.038041 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:05:45.038282 systemd[1]: Reached target sysinit.target. Dec 13 02:05:45.047194 systemd[1]: Started motdgen.path. Dec 13 02:05:45.054148 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:05:45.064340 systemd[1]: Started logrotate.timer. Dec 13 02:05:45.072250 systemd[1]: Started mdadm.timer. Dec 13 02:05:45.079052 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:05:45.087990 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:05:45.088314 systemd[1]: Reached target paths.target. Dec 13 02:05:45.096006 systemd[1]: Reached target timers.target. Dec 13 02:05:45.103524 systemd[1]: Listening on dbus.socket. Dec 13 02:05:45.112653 systemd[1]: Starting docker.socket... Dec 13 02:05:45.124229 systemd[1]: Listening on sshd.socket. Dec 13 02:05:45.131089 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:45.131399 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:05:45.134286 systemd[1]: Listening on docker.socket. Dec 13 02:05:45.144724 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:05:45.144921 systemd[1]: Reached target sockets.target. Dec 13 02:05:45.154028 systemd[1]: Reached target basic.target. Dec 13 02:05:45.161109 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:05:45.161291 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:05:45.163357 systemd[1]: Starting containerd.service... Dec 13 02:05:45.172907 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 02:05:45.184165 systemd[1]: Starting dbus.service... Dec 13 02:05:45.194924 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:05:45.204468 systemd[1]: Starting extend-filesystems.service... Dec 13 02:05:45.211842 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:05:45.214358 systemd[1]: Starting modprobe@drm.service... Dec 13 02:05:45.220245 jq[1189]: false Dec 13 02:05:45.223643 systemd[1]: Starting motdgen.service... Dec 13 02:05:45.233429 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:05:45.244029 systemd[1]: Starting sshd-keygen.service... Dec 13 02:05:45.253051 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:05:45.261830 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:45.262140 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 02:05:45.263058 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:05:45.264590 systemd[1]: Starting update-engine.service... Dec 13 02:05:45.274462 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:05:45.288505 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:05:45.288824 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:05:45.289783 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:05:45.290751 systemd[1]: Finished modprobe@drm.service. Dec 13 02:05:45.293258 jq[1210]: true Dec 13 02:05:45.299761 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:05:45.300029 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:05:45.305582 extend-filesystems[1191]: Found loop1 Dec 13 02:05:45.318142 extend-filesystems[1191]: Found sda Dec 13 02:05:45.318142 extend-filesystems[1191]: Found sda1 Dec 13 02:05:45.318142 extend-filesystems[1191]: Found sda2 Dec 13 02:05:45.318142 extend-filesystems[1191]: Found sda3 Dec 13 02:05:45.318142 extend-filesystems[1191]: Found usr Dec 13 02:05:45.318142 extend-filesystems[1191]: Found sda4 Dec 13 02:05:45.318142 extend-filesystems[1191]: Found sda6 Dec 13 02:05:45.318142 extend-filesystems[1191]: Found sda7 Dec 13 02:05:45.318142 extend-filesystems[1191]: Found sda9 Dec 13 02:05:45.318142 extend-filesystems[1191]: Checking size of /dev/sda9 Dec 13 02:05:45.574063 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 02:05:45.574118 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 02:05:45.311245 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:05:45.574347 extend-filesystems[1191]: Resized partition /dev/sda9 Dec 13 02:05:45.582879 update_engine[1207]: I1213 02:05:45.386848 1207 main.cc:92] Flatcar Update Engine starting Dec 13 02:05:45.582879 update_engine[1207]: I1213 02:05:45.394098 1207 update_check_scheduler.cc:74] Next update check in 4m44s Dec 13 02:05:45.336215 dbus-daemon[1188]: [system] SELinux support is enabled Dec 13 02:05:45.311499 systemd[1]: Finished motdgen.service. Dec 13 02:05:45.584053 extend-filesystems[1218]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:05:45.584053 extend-filesystems[1218]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 02:05:45.584053 extend-filesystems[1218]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 02:05:45.584053 extend-filesystems[1218]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 02:05:45.340358 dbus-daemon[1188]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1029 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 02:05:45.628785 env[1220]: time="2024-12-13T02:05:45.550369583Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:05:45.335872 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:05:45.629359 extend-filesystems[1191]: Resized filesystem in /dev/sda9 Dec 13 02:05:45.381145 dbus-daemon[1188]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 02:05:45.638061 jq[1219]: true Dec 13 02:05:45.342502 systemd[1]: Started dbus.service. Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.629 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.633 INFO Fetch failed with 404: resource not found Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.633 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.634 INFO Fetch successful Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.634 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.635 INFO Fetch failed with 404: resource not found Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.635 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.635 INFO Fetch failed with 404: resource not found Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.635 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 02:05:45.638547 coreos-metadata[1187]: Dec 13 02:05:45.636 INFO Fetch successful Dec 13 02:05:45.383080 systemd[1]: Finished ensure-sysext.service. Dec 13 02:05:45.639903 bash[1242]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:05:45.428447 systemd[1]: Started update-engine.service. Dec 13 02:05:45.441317 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:05:45.441559 systemd[1]: Finished extend-filesystems.service. Dec 13 02:05:45.451582 systemd[1]: Reached target network-online.target. Dec 13 02:05:45.462394 systemd[1]: Starting kubelet.service... Dec 13 02:05:45.483392 systemd[1]: Started locksmithd.service. Dec 13 02:05:45.641376 mkfs.ext4[1252]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 02:05:45.641376 mkfs.ext4[1252]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 02:05:45.641376 mkfs.ext4[1252]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 02:05:45.641376 mkfs.ext4[1252]: Filesystem UUID: deac758e-77a3-471d-843f-6df4f160cb96 Dec 13 02:05:45.641376 mkfs.ext4[1252]: Superblock backups stored on blocks: Dec 13 02:05:45.641376 mkfs.ext4[1252]: 32768, 98304, 163840, 229376 Dec 13 02:05:45.641376 mkfs.ext4[1252]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:05:45.641376 mkfs.ext4[1252]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:05:45.641376 mkfs.ext4[1252]: Creating journal (8192 blocks): done Dec 13 02:05:45.641376 mkfs.ext4[1252]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:05:45.494366 systemd[1]: Starting oem-gce.service... Dec 13 02:05:45.499513 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:05:45.499590 systemd[1]: Reached target system-config.target. Dec 13 02:05:45.510839 systemd[1]: Starting systemd-hostnamed.service... Dec 13 02:05:45.521977 systemd[1]: Starting systemd-logind.service... Dec 13 02:05:45.529935 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:05:45.530015 systemd[1]: Reached target user-config.target. Dec 13 02:05:45.539534 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:05:45.638959 unknown[1187]: wrote ssh authorized keys file for user: core Dec 13 02:05:45.670327 umount[1255]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 02:05:45.677969 update-ssh-keys[1256]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:05:45.678654 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 02:05:45.687709 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:05:45.707703 env[1220]: time="2024-12-13T02:05:45.707624360Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:05:45.707864 env[1220]: time="2024-12-13T02:05:45.707841435Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:45.717645 env[1220]: time="2024-12-13T02:05:45.716708929Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:05:45.717645 env[1220]: time="2024-12-13T02:05:45.716765030Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:45.717645 env[1220]: time="2024-12-13T02:05:45.717072745Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:05:45.717645 env[1220]: time="2024-12-13T02:05:45.717100983Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:45.717645 env[1220]: time="2024-12-13T02:05:45.717123600Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:05:45.717645 env[1220]: time="2024-12-13T02:05:45.717141393Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:45.717645 env[1220]: time="2024-12-13T02:05:45.717251274Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:45.717645 env[1220]: time="2024-12-13T02:05:45.717562421Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:45.718094 env[1220]: time="2024-12-13T02:05:45.717846591Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:05:45.718094 env[1220]: time="2024-12-13T02:05:45.717887287Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:05:45.718094 env[1220]: time="2024-12-13T02:05:45.717979622Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:05:45.718094 env[1220]: time="2024-12-13T02:05:45.718001510Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:05:45.738342 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.743744074Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.743805585Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.743829075Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.743897218Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.743925485Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.744023894Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.744048244Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.744072710Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.744103625Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.744132997Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.744155455Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.744177367Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.744373872Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:05:45.744944 env[1220]: time="2024-12-13T02:05:45.744515048Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.745969158Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746022884Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746048579Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746127750Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746151636Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746249560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746273866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746297307Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746318645Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746339558Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746360563Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746384015Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746560994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746592604Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.747702 env[1220]: time="2024-12-13T02:05:45.746623732Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.748422 env[1220]: time="2024-12-13T02:05:45.746643623Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:05:45.748422 env[1220]: time="2024-12-13T02:05:45.746672375Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:05:45.748422 env[1220]: time="2024-12-13T02:05:45.746737169Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:05:45.748422 env[1220]: time="2024-12-13T02:05:45.746774241Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:05:45.748422 env[1220]: time="2024-12-13T02:05:45.746825669Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:05:45.748669 env[1220]: time="2024-12-13T02:05:45.747144646Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:05:45.748669 env[1220]: time="2024-12-13T02:05:45.747234990Z" level=info msg="Connect containerd service" Dec 13 02:05:45.748669 env[1220]: time="2024-12-13T02:05:45.747279649Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:05:45.752289 env[1220]: time="2024-12-13T02:05:45.749375361Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:05:45.752289 env[1220]: time="2024-12-13T02:05:45.750712399Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:05:45.752289 env[1220]: time="2024-12-13T02:05:45.750793551Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:05:45.750963 systemd[1]: Started containerd.service. Dec 13 02:05:45.755494 env[1220]: time="2024-12-13T02:05:45.755451770Z" level=info msg="containerd successfully booted in 0.206005s" Dec 13 02:05:45.789034 env[1220]: time="2024-12-13T02:05:45.788954178Z" level=info msg="Start subscribing containerd event" Dec 13 02:05:45.799036 env[1220]: time="2024-12-13T02:05:45.798964093Z" level=info msg="Start recovering state" Dec 13 02:05:45.801404 env[1220]: time="2024-12-13T02:05:45.801366926Z" level=info msg="Start event monitor" Dec 13 02:05:45.801643 env[1220]: time="2024-12-13T02:05:45.801596851Z" level=info msg="Start snapshots syncer" Dec 13 02:05:45.801793 env[1220]: time="2024-12-13T02:05:45.801772716Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:05:45.801919 env[1220]: time="2024-12-13T02:05:45.801893315Z" level=info msg="Start streaming server" Dec 13 02:05:45.831799 dbus-daemon[1188]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 02:05:45.832024 systemd[1]: Started systemd-hostnamed.service. Dec 13 02:05:45.834203 dbus-daemon[1188]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1246 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 02:05:45.844739 systemd[1]: Starting polkit.service... Dec 13 02:05:45.886821 polkitd[1264]: Started polkitd version 121 Dec 13 02:05:45.893708 systemd-logind[1248]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:05:45.896464 systemd-logind[1248]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 02:05:45.896725 systemd-logind[1248]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:05:45.897070 systemd-logind[1248]: New seat seat0. Dec 13 02:05:45.913049 polkitd[1264]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 02:05:45.913375 polkitd[1264]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 02:05:45.915108 systemd[1]: Started systemd-logind.service. Dec 13 02:05:45.920897 polkitd[1264]: Finished loading, compiling and executing 2 rules Dec 13 02:05:45.923267 dbus-daemon[1188]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 02:05:45.924260 systemd[1]: Started polkit.service. Dec 13 02:05:45.925439 polkitd[1264]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 02:05:45.964441 systemd-hostnamed[1246]: Hostname set to (transient) Dec 13 02:05:45.967823 systemd-resolved[1155]: System hostname changed to 'ci-3510-3-6-f61f074745d47dde7ef5.c.flatcar-212911.internal'. Dec 13 02:05:47.516139 systemd[1]: Started kubelet.service. Dec 13 02:05:48.147133 locksmithd[1243]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:05:48.978971 kubelet[1276]: E1213 02:05:48.978917 1276 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:05:48.986360 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:05:48.986595 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:05:48.986995 systemd[1]: kubelet.service: Consumed 1.515s CPU time. Dec 13 02:05:49.586808 sshd_keygen[1212]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:05:49.638215 systemd[1]: Finished sshd-keygen.service. Dec 13 02:05:49.649422 systemd[1]: Starting issuegen.service... Dec 13 02:05:49.661184 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:05:49.661441 systemd[1]: Finished issuegen.service. Dec 13 02:05:49.671562 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:05:49.683103 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:05:49.694437 systemd[1]: Started getty@tty1.service. Dec 13 02:05:49.704571 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:05:49.713263 systemd[1]: Reached target getty.target. Dec 13 02:05:51.522399 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 02:05:51.935187 systemd[1]: Created slice system-sshd.slice. Dec 13 02:05:51.946224 systemd[1]: Started sshd@0-10.128.0.29:22-139.178.68.195:53100.service. Dec 13 02:05:52.315722 sshd[1301]: Accepted publickey for core from 139.178.68.195 port 53100 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:05:52.320134 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:52.337692 systemd[1]: Created slice user-500.slice. Dec 13 02:05:52.347409 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:05:52.358999 systemd-logind[1248]: New session 1 of user core. Dec 13 02:05:52.364989 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:05:52.376137 systemd[1]: Starting user@500.service... Dec 13 02:05:52.459839 (systemd)[1304]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:52.567888 systemd[1304]: Queued start job for default target default.target. Dec 13 02:05:52.568782 systemd[1304]: Reached target paths.target. Dec 13 02:05:52.568824 systemd[1304]: Reached target sockets.target. Dec 13 02:05:52.568846 systemd[1304]: Reached target timers.target. Dec 13 02:05:52.568867 systemd[1304]: Reached target basic.target. Dec 13 02:05:52.569044 systemd[1]: Started user@500.service. Dec 13 02:05:52.569410 systemd[1304]: Reached target default.target. Dec 13 02:05:52.569490 systemd[1304]: Startup finished in 100ms. Dec 13 02:05:52.577620 systemd[1]: Started session-1.scope. Dec 13 02:05:52.809741 systemd[1]: Started sshd@1-10.128.0.29:22-139.178.68.195:53114.service. Dec 13 02:05:53.101228 sshd[1313]: Accepted publickey for core from 139.178.68.195 port 53114 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:05:53.103162 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:53.110470 systemd-logind[1248]: New session 2 of user core. Dec 13 02:05:53.111246 systemd[1]: Started session-2.scope. Dec 13 02:05:53.317596 sshd[1313]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:53.322881 systemd[1]: sshd@1-10.128.0.29:22-139.178.68.195:53114.service: Deactivated successfully. Dec 13 02:05:53.323979 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:05:53.324883 systemd-logind[1248]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:05:53.326077 systemd-logind[1248]: Removed session 2. Dec 13 02:05:53.364426 systemd[1]: Started sshd@2-10.128.0.29:22-139.178.68.195:53118.service. Dec 13 02:05:53.590727 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:05:53.614713 systemd-nspawn[1321]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 02:05:53.614713 systemd-nspawn[1321]: Press ^] three times within 1s to kill container. Dec 13 02:05:53.628740 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:05:53.658928 sshd[1319]: Accepted publickey for core from 139.178.68.195 port 53118 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:05:53.660096 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:53.667922 systemd[1]: Started session-3.scope. Dec 13 02:05:53.668777 systemd-logind[1248]: New session 3 of user core. Dec 13 02:05:53.731179 systemd[1]: Started oem-gce.service. Dec 13 02:05:53.738351 systemd[1]: Reached target multi-user.target. Dec 13 02:05:53.749219 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:05:53.762480 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:05:53.762749 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:05:53.773070 systemd[1]: Startup finished in 1.025s (kernel) + 7.262s (initrd) + 16.225s (userspace) = 24.513s. Dec 13 02:05:53.804047 systemd-nspawn[1321]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 02:05:53.804047 systemd-nspawn[1321]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 02:05:53.804400 systemd-nspawn[1321]: + /usr/bin/google_instance_setup Dec 13 02:05:53.874694 sshd[1319]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:53.881137 systemd[1]: sshd@2-10.128.0.29:22-139.178.68.195:53118.service: Deactivated successfully. Dec 13 02:05:53.882327 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:05:53.883577 systemd-logind[1248]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:05:53.884836 systemd-logind[1248]: Removed session 3. Dec 13 02:05:54.434745 instance-setup[1328]: INFO Running google_set_multiqueue. Dec 13 02:05:54.449572 instance-setup[1328]: INFO Set channels for eth0 to 2. Dec 13 02:05:54.453381 instance-setup[1328]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 02:05:54.454980 instance-setup[1328]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 02:05:54.455287 instance-setup[1328]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 02:05:54.457117 instance-setup[1328]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 02:05:54.457525 instance-setup[1328]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 02:05:54.458927 instance-setup[1328]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 02:05:54.459461 instance-setup[1328]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 02:05:54.460995 instance-setup[1328]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 02:05:54.472951 instance-setup[1328]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 02:05:54.473118 instance-setup[1328]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 02:05:54.514918 systemd-nspawn[1321]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 02:05:54.850527 startup-script[1362]: INFO Starting startup scripts. Dec 13 02:05:54.864300 startup-script[1362]: INFO No startup scripts found in metadata. Dec 13 02:05:54.864461 startup-script[1362]: INFO Finished running startup scripts. Dec 13 02:05:54.898709 systemd-nspawn[1321]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 02:05:54.898709 systemd-nspawn[1321]: + daemon_pids=() Dec 13 02:05:54.899365 systemd-nspawn[1321]: + for d in accounts clock_skew network Dec 13 02:05:54.899365 systemd-nspawn[1321]: + daemon_pids+=($!) Dec 13 02:05:54.899365 systemd-nspawn[1321]: + for d in accounts clock_skew network Dec 13 02:05:54.899598 systemd-nspawn[1321]: + daemon_pids+=($!) Dec 13 02:05:54.899714 systemd-nspawn[1321]: + for d in accounts clock_skew network Dec 13 02:05:54.899968 systemd-nspawn[1321]: + daemon_pids+=($!) Dec 13 02:05:54.900097 systemd-nspawn[1321]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 02:05:54.900097 systemd-nspawn[1321]: + /usr/bin/systemd-notify --ready Dec 13 02:05:54.900745 systemd-nspawn[1321]: + /usr/bin/google_network_daemon Dec 13 02:05:54.901084 systemd-nspawn[1321]: + /usr/bin/google_clock_skew_daemon Dec 13 02:05:54.905967 systemd-nspawn[1321]: + /usr/bin/google_accounts_daemon Dec 13 02:05:54.980628 systemd-nspawn[1321]: + wait -n 36 37 38 Dec 13 02:05:55.492169 google-clock-skew[1366]: INFO Starting Google Clock Skew daemon. Dec 13 02:05:55.516260 google-clock-skew[1366]: INFO Clock drift token has changed: 0. Dec 13 02:05:55.531362 systemd-nspawn[1321]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 02:05:55.531635 systemd-nspawn[1321]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 02:05:55.532652 google-clock-skew[1366]: WARNING Failed to sync system time with hardware clock. Dec 13 02:05:55.569885 google-networking[1367]: INFO Starting Google Networking daemon. Dec 13 02:05:55.666377 groupadd[1377]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 02:05:55.670011 groupadd[1377]: group added to /etc/gshadow: name=google-sudoers Dec 13 02:05:55.673950 groupadd[1377]: new group: name=google-sudoers, GID=1000 Dec 13 02:05:55.687654 google-accounts[1365]: INFO Starting Google Accounts daemon. Dec 13 02:05:55.712851 google-accounts[1365]: WARNING OS Login not installed. Dec 13 02:05:55.713924 google-accounts[1365]: INFO Creating a new user account for 0. Dec 13 02:05:55.719378 systemd-nspawn[1321]: useradd: invalid user name '0': use --badname to ignore Dec 13 02:05:55.720060 google-accounts[1365]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 02:05:59.108745 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:05:59.109140 systemd[1]: Stopped kubelet.service. Dec 13 02:05:59.109225 systemd[1]: kubelet.service: Consumed 1.515s CPU time. Dec 13 02:05:59.111789 systemd[1]: Starting kubelet.service... Dec 13 02:05:59.303475 systemd[1]: Started kubelet.service. Dec 13 02:05:59.363764 kubelet[1391]: E1213 02:05:59.363583 1391 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:05:59.368488 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:05:59.368749 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:06:03.920632 systemd[1]: Started sshd@3-10.128.0.29:22-139.178.68.195:47496.service. Dec 13 02:06:04.203851 sshd[1398]: Accepted publickey for core from 139.178.68.195 port 47496 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:04.206232 sshd[1398]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:04.213544 systemd-logind[1248]: New session 4 of user core. Dec 13 02:06:04.214456 systemd[1]: Started session-4.scope. Dec 13 02:06:04.418427 sshd[1398]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:04.423060 systemd[1]: sshd@3-10.128.0.29:22-139.178.68.195:47496.service: Deactivated successfully. Dec 13 02:06:04.424253 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:06:04.425244 systemd-logind[1248]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:06:04.426528 systemd-logind[1248]: Removed session 4. Dec 13 02:06:04.465717 systemd[1]: Started sshd@4-10.128.0.29:22-139.178.68.195:47498.service. Dec 13 02:06:04.752122 sshd[1404]: Accepted publickey for core from 139.178.68.195 port 47498 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:04.754455 sshd[1404]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:04.761953 systemd[1]: Started session-5.scope. Dec 13 02:06:04.762585 systemd-logind[1248]: New session 5 of user core. Dec 13 02:06:04.961313 sshd[1404]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:04.965722 systemd[1]: sshd@4-10.128.0.29:22-139.178.68.195:47498.service: Deactivated successfully. Dec 13 02:06:04.966932 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:06:04.967780 systemd-logind[1248]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:06:04.969037 systemd-logind[1248]: Removed session 5. Dec 13 02:06:05.006710 systemd[1]: Started sshd@5-10.128.0.29:22-139.178.68.195:47506.service. Dec 13 02:06:05.289369 sshd[1410]: Accepted publickey for core from 139.178.68.195 port 47506 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:05.291355 sshd[1410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:05.297801 systemd-logind[1248]: New session 6 of user core. Dec 13 02:06:05.298292 systemd[1]: Started session-6.scope. Dec 13 02:06:05.502091 sshd[1410]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:05.506165 systemd[1]: sshd@5-10.128.0.29:22-139.178.68.195:47506.service: Deactivated successfully. Dec 13 02:06:05.507215 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:06:05.508151 systemd-logind[1248]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:06:05.509384 systemd-logind[1248]: Removed session 6. Dec 13 02:06:05.549384 systemd[1]: Started sshd@6-10.128.0.29:22-139.178.68.195:47512.service. Dec 13 02:06:05.836540 sshd[1416]: Accepted publickey for core from 139.178.68.195 port 47512 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:05.838199 sshd[1416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:05.844777 systemd-logind[1248]: New session 7 of user core. Dec 13 02:06:05.845109 systemd[1]: Started session-7.scope. Dec 13 02:06:06.033927 sudo[1419]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:06:06.034351 sudo[1419]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:06:06.042954 dbus-daemon[1188]: \xd0-{?3V: received setenforce notice (enforcing=-1106521808) Dec 13 02:06:06.045206 sudo[1419]: pam_unix(sudo:session): session closed for user root Dec 13 02:06:06.090008 sshd[1416]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:06.095030 systemd[1]: sshd@6-10.128.0.29:22-139.178.68.195:47512.service: Deactivated successfully. Dec 13 02:06:06.096272 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:06:06.097188 systemd-logind[1248]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:06:06.098511 systemd-logind[1248]: Removed session 7. Dec 13 02:06:06.135152 systemd[1]: Started sshd@7-10.128.0.29:22-139.178.68.195:40172.service. Dec 13 02:06:06.416038 sshd[1423]: Accepted publickey for core from 139.178.68.195 port 40172 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:06.418014 sshd[1423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:06.425058 systemd[1]: Started session-8.scope. Dec 13 02:06:06.425706 systemd-logind[1248]: New session 8 of user core. Dec 13 02:06:06.592406 sudo[1427]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:06:06.592847 sudo[1427]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:06:06.597189 sudo[1427]: pam_unix(sudo:session): session closed for user root Dec 13 02:06:06.609890 sudo[1426]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:06:06.610317 sudo[1426]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:06:06.623230 systemd[1]: Stopping audit-rules.service... Dec 13 02:06:06.624000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:06:06.627960 auditctl[1430]: No rules Dec 13 02:06:06.639694 kernel: kauditd_printk_skb: 205 callbacks suppressed Dec 13 02:06:06.639839 kernel: audit: type=1305 audit(1734055566.624:186): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:06:06.630117 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:06:06.630392 systemd[1]: Stopped audit-rules.service. Dec 13 02:06:06.636989 systemd[1]: Starting audit-rules.service... Dec 13 02:06:06.624000 audit[1430]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc85199320 a2=420 a3=0 items=0 ppid=1 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:06.672747 augenrules[1447]: No rules Dec 13 02:06:06.674905 systemd[1]: Finished audit-rules.service. Dec 13 02:06:06.678333 kernel: audit: type=1300 audit(1734055566.624:186): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc85199320 a2=420 a3=0 items=0 ppid=1 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:06.677769 sudo[1426]: pam_unix(sudo:session): session closed for user root Dec 13 02:06:06.624000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:06:06.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.710436 kernel: audit: type=1327 audit(1734055566.624:186): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:06:06.710592 kernel: audit: type=1131 audit(1734055566.629:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.710638 kernel: audit: type=1130 audit(1734055566.674:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.677000 audit[1426]: USER_END pid=1426 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.732663 sshd[1423]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:06.738016 systemd-logind[1248]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:06:06.740324 systemd[1]: sshd@7-10.128.0.29:22-139.178.68.195:40172.service: Deactivated successfully. Dec 13 02:06:06.741445 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:06:06.743546 systemd-logind[1248]: Removed session 8. Dec 13 02:06:06.757275 kernel: audit: type=1106 audit(1734055566.677:189): pid=1426 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.757442 kernel: audit: type=1104 audit(1734055566.677:190): pid=1426 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.677000 audit[1426]: CRED_DISP pid=1426 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.813195 kernel: audit: type=1106 audit(1734055566.733:191): pid=1423 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:06.733000 audit[1423]: USER_END pid=1423 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:06.786950 systemd[1]: Started sshd@8-10.128.0.29:22-139.178.68.195:40174.service. Dec 13 02:06:06.733000 audit[1423]: CRED_DISP pid=1423 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:06.838895 kernel: audit: type=1104 audit(1734055566.733:192): pid=1423 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:06.839066 kernel: audit: type=1131 audit(1734055566.739:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.29:22-139.178.68.195:40172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.29:22-139.178.68.195:40172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:06.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.29:22-139.178.68.195:40174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:07.078000 audit[1453]: USER_ACCT pid=1453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:07.079486 sshd[1453]: Accepted publickey for core from 139.178.68.195 port 40174 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:07.080000 audit[1453]: CRED_ACQ pid=1453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:07.080000 audit[1453]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8dfdf480 a2=3 a3=0 items=0 ppid=1 pid=1453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:07.080000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:07.082138 sshd[1453]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:07.088832 systemd[1]: Started session-9.scope. Dec 13 02:06:07.089636 systemd-logind[1248]: New session 9 of user core. Dec 13 02:06:07.096000 audit[1453]: USER_START pid=1453 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:07.098000 audit[1455]: CRED_ACQ pid=1455 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:07.257000 audit[1456]: USER_ACCT pid=1456 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:07.258169 sudo[1456]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:06:07.257000 audit[1456]: CRED_REFR pid=1456 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:07.258614 sudo[1456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:06:07.260000 audit[1456]: USER_START pid=1456 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:07.276980 systemd[1]: Starting coreos-metadata.service... Dec 13 02:06:07.326196 coreos-metadata[1460]: Dec 13 02:06:07.326 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Dec 13 02:06:07.328462 coreos-metadata[1460]: Dec 13 02:06:07.328 INFO Fetch successful Dec 13 02:06:07.328610 coreos-metadata[1460]: Dec 13 02:06:07.328 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Dec 13 02:06:07.329377 coreos-metadata[1460]: Dec 13 02:06:07.329 INFO Fetch successful Dec 13 02:06:07.329659 coreos-metadata[1460]: Dec 13 02:06:07.329 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Dec 13 02:06:07.330510 coreos-metadata[1460]: Dec 13 02:06:07.330 INFO Fetch successful Dec 13 02:06:07.330510 coreos-metadata[1460]: Dec 13 02:06:07.330 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Dec 13 02:06:07.331442 coreos-metadata[1460]: Dec 13 02:06:07.331 INFO Fetch successful Dec 13 02:06:07.342242 systemd[1]: Finished coreos-metadata.service. Dec 13 02:06:07.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:08.371127 systemd[1]: Stopped kubelet.service. Dec 13 02:06:08.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:08.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:08.375411 systemd[1]: Starting kubelet.service... Dec 13 02:06:08.405456 systemd[1]: Reloading. Dec 13 02:06:08.565634 /usr/lib/systemd/system-generators/torcx-generator[1518]: time="2024-12-13T02:06:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:06:08.568754 /usr/lib/systemd/system-generators/torcx-generator[1518]: time="2024-12-13T02:06:08Z" level=info msg="torcx already run" Dec 13 02:06:08.690569 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:06:08.690601 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:06:08.714745 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:06:08.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.806000 audit: BPF prog-id=43 op=LOAD Dec 13 02:06:08.806000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.809000 audit: BPF prog-id=44 op=LOAD Dec 13 02:06:08.809000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.810000 audit: BPF prog-id=45 op=LOAD Dec 13 02:06:08.811000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit: BPF prog-id=46 op=LOAD Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.811000 audit: BPF prog-id=47 op=LOAD Dec 13 02:06:08.811000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:06:08.811000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.812000 audit: BPF prog-id=48 op=LOAD Dec 13 02:06:08.812000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:06:08.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit: BPF prog-id=49 op=LOAD Dec 13 02:06:08.815000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit: BPF prog-id=50 op=LOAD Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.815000 audit: BPF prog-id=51 op=LOAD Dec 13 02:06:08.815000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:06:08.815000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.816000 audit: BPF prog-id=52 op=LOAD Dec 13 02:06:08.816000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.817000 audit: BPF prog-id=53 op=LOAD Dec 13 02:06:08.817000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:06:08.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit: BPF prog-id=54 op=LOAD Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit: BPF prog-id=55 op=LOAD Dec 13 02:06:08.818000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:06:08.818000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit: BPF prog-id=56 op=LOAD Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.818000 audit: BPF prog-id=57 op=LOAD Dec 13 02:06:08.819000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:06:08.819000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:06:08.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit: BPF prog-id=58 op=LOAD Dec 13 02:06:08.820000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit: BPF prog-id=59 op=LOAD Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:08.820000 audit: BPF prog-id=60 op=LOAD Dec 13 02:06:08.820000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:06:08.820000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:06:08.862460 systemd[1]: Started kubelet.service. Dec 13 02:06:08.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:08.866412 systemd[1]: Stopping kubelet.service... Dec 13 02:06:08.866929 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:06:08.867200 systemd[1]: Stopped kubelet.service. Dec 13 02:06:08.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:08.869742 systemd[1]: Starting kubelet.service... Dec 13 02:06:09.111191 systemd[1]: Started kubelet.service. Dec 13 02:06:09.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:09.167503 kubelet[1569]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:06:09.167503 kubelet[1569]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:06:09.167503 kubelet[1569]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:06:09.168115 kubelet[1569]: I1213 02:06:09.167582 1569 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:06:09.721994 kubelet[1569]: I1213 02:06:09.721937 1569 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:06:09.721994 kubelet[1569]: I1213 02:06:09.721975 1569 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:06:09.722341 kubelet[1569]: I1213 02:06:09.722303 1569 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:06:09.743415 kubelet[1569]: I1213 02:06:09.742711 1569 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:06:09.759325 kubelet[1569]: I1213 02:06:09.759288 1569 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:06:09.759946 kubelet[1569]: I1213 02:06:09.759885 1569 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:06:09.760228 kubelet[1569]: I1213 02:06:09.759932 1569 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.128.0.29","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:06:09.761380 kubelet[1569]: I1213 02:06:09.761336 1569 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:06:09.761380 kubelet[1569]: I1213 02:06:09.761375 1569 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:06:09.761567 kubelet[1569]: I1213 02:06:09.761547 1569 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:06:09.762916 kubelet[1569]: I1213 02:06:09.762884 1569 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:06:09.763021 kubelet[1569]: I1213 02:06:09.762925 1569 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:06:09.763021 kubelet[1569]: I1213 02:06:09.762964 1569 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:06:09.763021 kubelet[1569]: I1213 02:06:09.762991 1569 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:06:09.763569 kubelet[1569]: E1213 02:06:09.763519 1569 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:09.763859 kubelet[1569]: E1213 02:06:09.763818 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:09.769304 kubelet[1569]: I1213 02:06:09.769277 1569 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:06:09.771040 kubelet[1569]: W1213 02:06:09.770794 1569 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.128.0.29" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:06:09.771040 kubelet[1569]: E1213 02:06:09.770857 1569 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.29" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:06:09.771040 kubelet[1569]: W1213 02:06:09.770985 1569 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:06:09.771040 kubelet[1569]: E1213 02:06:09.771006 1569 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:06:09.771891 kubelet[1569]: I1213 02:06:09.771864 1569 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:06:09.772003 kubelet[1569]: W1213 02:06:09.771942 1569 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:06:09.772791 kubelet[1569]: I1213 02:06:09.772764 1569 server.go:1264] "Started kubelet" Dec 13 02:06:09.776000 audit[1569]: AVC avc: denied { mac_admin } for pid=1569 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.776000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:06:09.776000 audit[1569]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009bde30 a1=c000a76450 a2=c0009bde00 a3=25 items=0 ppid=1 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:06:09.776000 audit[1569]: AVC avc: denied { mac_admin } for pid=1569 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.776000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:06:09.776000 audit[1569]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a6c220 a1=c000a76468 a2=c0009bdec0 a3=25 items=0 ppid=1 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:06:09.778066 kubelet[1569]: I1213 02:06:09.777371 1569 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:06:09.778066 kubelet[1569]: I1213 02:06:09.777434 1569 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:06:09.778066 kubelet[1569]: I1213 02:06:09.777526 1569 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:06:09.793556 kubelet[1569]: I1213 02:06:09.788169 1569 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:06:09.793556 kubelet[1569]: I1213 02:06:09.789673 1569 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:06:09.793556 kubelet[1569]: I1213 02:06:09.791385 1569 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:06:09.794722 kubelet[1569]: I1213 02:06:09.794593 1569 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:06:09.802960 kubelet[1569]: I1213 02:06:09.802911 1569 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:06:09.807573 kubelet[1569]: I1213 02:06:09.807484 1569 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:06:09.807876 kubelet[1569]: I1213 02:06:09.807851 1569 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:06:09.813011 kubelet[1569]: E1213 02:06:09.812968 1569 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.29\" not found" node="10.128.0.29" Dec 13 02:06:09.825086 kubelet[1569]: I1213 02:06:09.825038 1569 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:06:09.825347 kubelet[1569]: I1213 02:06:09.825261 1569 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:06:09.827832 kubelet[1569]: I1213 02:06:09.827800 1569 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:06:09.829824 kubelet[1569]: E1213 02:06:09.829795 1569 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:06:09.848393 kubelet[1569]: I1213 02:06:09.848357 1569 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:06:09.848393 kubelet[1569]: I1213 02:06:09.848385 1569 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:06:09.848634 kubelet[1569]: I1213 02:06:09.848411 1569 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:06:09.854529 kubelet[1569]: I1213 02:06:09.853808 1569 policy_none.go:49] "None policy: Start" Dec 13 02:06:09.854000 audit[1582]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.854000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff8581f860 a2=0 a3=7fff8581f84c items=0 ppid=1569 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:06:09.855753 kubelet[1569]: I1213 02:06:09.855730 1569 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:06:09.855859 kubelet[1569]: I1213 02:06:09.855765 1569 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:06:09.856000 audit[1586]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.856000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffe3c9e980 a2=0 a3=7fffe3c9e96c items=0 ppid=1569 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:06:09.863470 systemd[1]: Created slice kubepods.slice. Dec 13 02:06:09.882201 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:06:09.887315 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:06:09.866000 audit[1588]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.866000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffed4c00ca0 a2=0 a3=7ffed4c00c8c items=0 ppid=1569 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:06:09.892996 kubelet[1569]: I1213 02:06:09.892964 1569 kubelet_node_status.go:73] "Attempting to register node" node="10.128.0.29" Dec 13 02:06:09.895400 kubelet[1569]: I1213 02:06:09.895373 1569 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:06:09.894000 audit[1569]: AVC avc: denied { mac_admin } for pid=1569 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.894000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:06:09.894000 audit[1569]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c94ae0 a1=c000cbe7c8 a2=c000c94ab0 a3=25 items=0 ppid=1 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.894000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:06:09.895973 kubelet[1569]: I1213 02:06:09.895488 1569 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:06:09.895973 kubelet[1569]: I1213 02:06:09.895703 1569 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:06:09.896831 kubelet[1569]: I1213 02:06:09.896807 1569 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:06:09.896000 audit[1594]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1594 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.896000 audit[1594]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7d21c410 a2=0 a3=7ffd7d21c3fc items=0 ppid=1569 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:06:09.899528 kubelet[1569]: I1213 02:06:09.899488 1569 kubelet_node_status.go:76] "Successfully registered node" node="10.128.0.29" Dec 13 02:06:09.901538 kubelet[1569]: E1213 02:06:09.901513 1569 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.29\" not found" Dec 13 02:06:09.925259 kubelet[1569]: E1213 02:06:09.925216 1569 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.29\" not found" Dec 13 02:06:09.961000 audit[1599]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1599 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.961000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff46e5a3a0 a2=0 a3=7fff46e5a38c items=0 ppid=1569 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:06:09.962881 kubelet[1569]: I1213 02:06:09.962833 1569 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:06:09.964000 audit[1600]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1600 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.964000 audit[1600]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4c0e2390 a2=0 a3=7ffc4c0e237c items=0 ppid=1569 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:06:09.964000 audit[1601]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1601 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.964000 audit[1601]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc016aba0 a2=0 a3=7ffcc016ab8c items=0 ppid=1569 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:06:09.965749 kubelet[1569]: I1213 02:06:09.965721 1569 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:06:09.965749 kubelet[1569]: I1213 02:06:09.965752 1569 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:06:09.965924 kubelet[1569]: I1213 02:06:09.965779 1569 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:06:09.965924 kubelet[1569]: E1213 02:06:09.965844 1569 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 02:06:09.967000 audit[1602]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1602 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.967000 audit[1602]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe15517100 a2=0 a3=7ffe155170ec items=0 ppid=1569 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:06:09.969000 audit[1605]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.969000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe68961590 a2=0 a3=7ffe6896157c items=0 ppid=1569 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:06:09.970000 audit[1603]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1603 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.970000 audit[1603]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9aab0e40 a2=0 a3=7ffe9aab0e2c items=0 ppid=1569 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:06:09.971000 audit[1606]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1606 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.971000 audit[1606]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd64723a70 a2=0 a3=7ffd64723a5c items=0 ppid=1569 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:06:09.974000 audit[1607]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.974000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6306e780 a2=0 a3=7ffd6306e76c items=0 ppid=1569 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:06:10.025710 kubelet[1569]: E1213 02:06:10.025634 1569 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.29\" not found" Dec 13 02:06:10.125822 kubelet[1569]: E1213 02:06:10.125777 1569 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.29\" not found" Dec 13 02:06:10.140273 sudo[1456]: pam_unix(sudo:session): session closed for user root Dec 13 02:06:10.139000 audit[1456]: USER_END pid=1456 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:10.139000 audit[1456]: CRED_DISP pid=1456 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:10.183714 sshd[1453]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:10.185000 audit[1453]: USER_END pid=1453 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.185000 audit[1453]: CRED_DISP pid=1453 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.188242 systemd[1]: sshd@8-10.128.0.29:22-139.178.68.195:40174.service: Deactivated successfully. Dec 13 02:06:10.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.29:22-139.178.68.195:40174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:10.189347 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:06:10.190252 systemd-logind[1248]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:06:10.191565 systemd-logind[1248]: Removed session 9. Dec 13 02:06:10.226711 kubelet[1569]: E1213 02:06:10.226548 1569 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.29\" not found" Dec 13 02:06:10.326934 kubelet[1569]: E1213 02:06:10.326871 1569 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.29\" not found" Dec 13 02:06:10.427762 kubelet[1569]: E1213 02:06:10.427707 1569 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.29\" not found" Dec 13 02:06:10.528600 kubelet[1569]: E1213 02:06:10.528438 1569 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.29\" not found" Dec 13 02:06:10.629474 kubelet[1569]: E1213 02:06:10.629408 1569 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.29\" not found" Dec 13 02:06:10.724835 kubelet[1569]: I1213 02:06:10.724724 1569 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 02:06:10.725134 kubelet[1569]: W1213 02:06:10.724981 1569 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 02:06:10.725134 kubelet[1569]: W1213 02:06:10.725027 1569 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 02:06:10.730511 kubelet[1569]: I1213 02:06:10.730474 1569 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 02:06:10.731078 env[1220]: time="2024-12-13T02:06:10.731019158Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:06:10.731590 kubelet[1569]: I1213 02:06:10.731372 1569 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 02:06:10.764583 kubelet[1569]: I1213 02:06:10.764534 1569 apiserver.go:52] "Watching apiserver" Dec 13 02:06:10.764876 kubelet[1569]: E1213 02:06:10.764542 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:10.771723 kubelet[1569]: I1213 02:06:10.771653 1569 topology_manager.go:215] "Topology Admit Handler" podUID="94b816d2-bd05-4afb-8a4e-230ce84a964d" podNamespace="calico-system" podName="calico-node-pkkc4" Dec 13 02:06:10.771925 kubelet[1569]: I1213 02:06:10.771869 1569 topology_manager.go:215] "Topology Admit Handler" podUID="13181872-b83c-4024-b2db-b96f8866cd4f" podNamespace="calico-system" podName="csi-node-driver-9p8wk" Dec 13 02:06:10.771996 kubelet[1569]: I1213 02:06:10.771977 1569 topology_manager.go:215] "Topology Admit Handler" podUID="741b60da-4ece-43c9-b212-48df9b641bc8" podNamespace="kube-system" podName="kube-proxy-lzx9c" Dec 13 02:06:10.772243 kubelet[1569]: E1213 02:06:10.772211 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9p8wk" podUID="13181872-b83c-4024-b2db-b96f8866cd4f" Dec 13 02:06:10.779752 systemd[1]: Created slice kubepods-besteffort-pod741b60da_4ece_43c9_b212_48df9b641bc8.slice. Dec 13 02:06:10.792275 kubelet[1569]: I1213 02:06:10.792224 1569 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:06:10.795783 systemd[1]: Created slice kubepods-besteffort-pod94b816d2_bd05_4afb_8a4e_230ce84a964d.slice. Dec 13 02:06:10.809452 kubelet[1569]: I1213 02:06:10.809401 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/13181872-b83c-4024-b2db-b96f8866cd4f-socket-dir\") pod \"csi-node-driver-9p8wk\" (UID: \"13181872-b83c-4024-b2db-b96f8866cd4f\") " pod="calico-system/csi-node-driver-9p8wk" Dec 13 02:06:10.809663 kubelet[1569]: I1213 02:06:10.809461 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-lib-modules\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.809663 kubelet[1569]: I1213 02:06:10.809488 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-policysync\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.809663 kubelet[1569]: I1213 02:06:10.809512 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-var-run-calico\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.809663 kubelet[1569]: I1213 02:06:10.809539 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-flexvol-driver-host\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.809663 kubelet[1569]: I1213 02:06:10.809566 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/13181872-b83c-4024-b2db-b96f8866cd4f-varrun\") pod \"csi-node-driver-9p8wk\" (UID: \"13181872-b83c-4024-b2db-b96f8866cd4f\") " pod="calico-system/csi-node-driver-9p8wk" Dec 13 02:06:10.809986 kubelet[1569]: I1213 02:06:10.809595 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/13181872-b83c-4024-b2db-b96f8866cd4f-kubelet-dir\") pod \"csi-node-driver-9p8wk\" (UID: \"13181872-b83c-4024-b2db-b96f8866cd4f\") " pod="calico-system/csi-node-driver-9p8wk" Dec 13 02:06:10.809986 kubelet[1569]: I1213 02:06:10.809621 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/13181872-b83c-4024-b2db-b96f8866cd4f-registration-dir\") pod \"csi-node-driver-9p8wk\" (UID: \"13181872-b83c-4024-b2db-b96f8866cd4f\") " pod="calico-system/csi-node-driver-9p8wk" Dec 13 02:06:10.809986 kubelet[1569]: I1213 02:06:10.809647 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/741b60da-4ece-43c9-b212-48df9b641bc8-kube-proxy\") pod \"kube-proxy-lzx9c\" (UID: \"741b60da-4ece-43c9-b212-48df9b641bc8\") " pod="kube-system/kube-proxy-lzx9c" Dec 13 02:06:10.809986 kubelet[1569]: I1213 02:06:10.809671 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tjxtv\" (UniqueName: \"kubernetes.io/projected/741b60da-4ece-43c9-b212-48df9b641bc8-kube-api-access-tjxtv\") pod \"kube-proxy-lzx9c\" (UID: \"741b60da-4ece-43c9-b212-48df9b641bc8\") " pod="kube-system/kube-proxy-lzx9c" Dec 13 02:06:10.809986 kubelet[1569]: I1213 02:06:10.809721 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/94b816d2-bd05-4afb-8a4e-230ce84a964d-node-certs\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.810239 kubelet[1569]: I1213 02:06:10.809752 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zcf29\" (UniqueName: \"kubernetes.io/projected/13181872-b83c-4024-b2db-b96f8866cd4f-kube-api-access-zcf29\") pod \"csi-node-driver-9p8wk\" (UID: \"13181872-b83c-4024-b2db-b96f8866cd4f\") " pod="calico-system/csi-node-driver-9p8wk" Dec 13 02:06:10.810239 kubelet[1569]: I1213 02:06:10.809778 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/94b816d2-bd05-4afb-8a4e-230ce84a964d-tigera-ca-bundle\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.810239 kubelet[1569]: I1213 02:06:10.809806 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-var-lib-calico\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.810239 kubelet[1569]: I1213 02:06:10.809833 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-bin-dir\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.810239 kubelet[1569]: I1213 02:06:10.809863 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k9788\" (UniqueName: \"kubernetes.io/projected/94b816d2-bd05-4afb-8a4e-230ce84a964d-kube-api-access-k9788\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.810432 kubelet[1569]: I1213 02:06:10.809889 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/741b60da-4ece-43c9-b212-48df9b641bc8-xtables-lock\") pod \"kube-proxy-lzx9c\" (UID: \"741b60da-4ece-43c9-b212-48df9b641bc8\") " pod="kube-system/kube-proxy-lzx9c" Dec 13 02:06:10.810432 kubelet[1569]: I1213 02:06:10.809919 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/741b60da-4ece-43c9-b212-48df9b641bc8-lib-modules\") pod \"kube-proxy-lzx9c\" (UID: \"741b60da-4ece-43c9-b212-48df9b641bc8\") " pod="kube-system/kube-proxy-lzx9c" Dec 13 02:06:10.810432 kubelet[1569]: I1213 02:06:10.809947 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-xtables-lock\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.810432 kubelet[1569]: I1213 02:06:10.809975 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-net-dir\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.810432 kubelet[1569]: I1213 02:06:10.810002 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-log-dir\") pod \"calico-node-pkkc4\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " pod="calico-system/calico-node-pkkc4" Dec 13 02:06:10.913715 kubelet[1569]: E1213 02:06:10.913662 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.913907 kubelet[1569]: W1213 02:06:10.913816 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.913907 kubelet[1569]: E1213 02:06:10.913866 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.914230 kubelet[1569]: E1213 02:06:10.914208 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.914339 kubelet[1569]: W1213 02:06:10.914241 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.914339 kubelet[1569]: E1213 02:06:10.914270 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.915185 kubelet[1569]: E1213 02:06:10.914976 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.915185 kubelet[1569]: W1213 02:06:10.914997 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.915185 kubelet[1569]: E1213 02:06:10.915021 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.915529 kubelet[1569]: E1213 02:06:10.915505 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.915529 kubelet[1569]: W1213 02:06:10.915526 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.915674 kubelet[1569]: E1213 02:06:10.915647 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.915919 kubelet[1569]: E1213 02:06:10.915874 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.915919 kubelet[1569]: W1213 02:06:10.915894 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.916195 kubelet[1569]: E1213 02:06:10.916173 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.916279 kubelet[1569]: E1213 02:06:10.916187 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.916279 kubelet[1569]: W1213 02:06:10.916243 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.916399 kubelet[1569]: E1213 02:06:10.916387 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.916615 kubelet[1569]: E1213 02:06:10.916594 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.916615 kubelet[1569]: W1213 02:06:10.916611 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.916797 kubelet[1569]: E1213 02:06:10.916730 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.917008 kubelet[1569]: E1213 02:06:10.916986 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.917008 kubelet[1569]: W1213 02:06:10.917003 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.917201 kubelet[1569]: E1213 02:06:10.917181 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.917296 kubelet[1569]: E1213 02:06:10.917276 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.917369 kubelet[1569]: W1213 02:06:10.917297 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.917369 kubelet[1569]: E1213 02:06:10.917313 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.917586 kubelet[1569]: E1213 02:06:10.917569 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.917586 kubelet[1569]: W1213 02:06:10.917584 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.917774 kubelet[1569]: E1213 02:06:10.917605 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.918001 kubelet[1569]: E1213 02:06:10.917981 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.918001 kubelet[1569]: W1213 02:06:10.918004 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.918150 kubelet[1569]: E1213 02:06:10.918027 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.918329 kubelet[1569]: E1213 02:06:10.918309 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.918329 kubelet[1569]: W1213 02:06:10.918326 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.918471 kubelet[1569]: E1213 02:06:10.918349 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.918663 kubelet[1569]: E1213 02:06:10.918644 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.918663 kubelet[1569]: W1213 02:06:10.918660 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.918837 kubelet[1569]: E1213 02:06:10.918712 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.919038 kubelet[1569]: E1213 02:06:10.919018 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.919038 kubelet[1569]: W1213 02:06:10.919034 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.919178 kubelet[1569]: E1213 02:06:10.919057 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.919364 kubelet[1569]: E1213 02:06:10.919344 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.919364 kubelet[1569]: W1213 02:06:10.919361 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.919500 kubelet[1569]: E1213 02:06:10.919384 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.919793 kubelet[1569]: E1213 02:06:10.919772 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.919793 kubelet[1569]: W1213 02:06:10.919790 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.919937 kubelet[1569]: E1213 02:06:10.919814 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.920330 kubelet[1569]: E1213 02:06:10.920306 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.920330 kubelet[1569]: W1213 02:06:10.920325 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.920465 kubelet[1569]: E1213 02:06:10.920343 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:10.929622 kubelet[1569]: E1213 02:06:10.929596 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:10.929865 kubelet[1569]: W1213 02:06:10.929842 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:10.929982 kubelet[1569]: E1213 02:06:10.929964 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:11.007241 kubelet[1569]: E1213 02:06:11.007183 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:11.007560 kubelet[1569]: W1213 02:06:11.007507 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:11.007857 kubelet[1569]: E1213 02:06:11.007795 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:11.008609 kubelet[1569]: E1213 02:06:11.008589 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:11.008775 kubelet[1569]: W1213 02:06:11.008756 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:11.008889 kubelet[1569]: E1213 02:06:11.008870 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:11.009703 kubelet[1569]: E1213 02:06:11.009653 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:11.009703 kubelet[1569]: W1213 02:06:11.009673 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:11.009892 kubelet[1569]: E1213 02:06:11.009715 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:11.092110 env[1220]: time="2024-12-13T02:06:11.091947035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lzx9c,Uid:741b60da-4ece-43c9-b212-48df9b641bc8,Namespace:kube-system,Attempt:0,}" Dec 13 02:06:11.100554 env[1220]: time="2024-12-13T02:06:11.100473353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pkkc4,Uid:94b816d2-bd05-4afb-8a4e-230ce84a964d,Namespace:calico-system,Attempt:0,}" Dec 13 02:06:11.676437 env[1220]: time="2024-12-13T02:06:11.676364175Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:11.679041 env[1220]: time="2024-12-13T02:06:11.678962380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:11.683247 env[1220]: time="2024-12-13T02:06:11.683180751Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:11.684503 env[1220]: time="2024-12-13T02:06:11.684449646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:11.685576 env[1220]: time="2024-12-13T02:06:11.685539473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:11.688107 env[1220]: time="2024-12-13T02:06:11.688061004Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:11.689000 env[1220]: time="2024-12-13T02:06:11.688963987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:11.691481 env[1220]: time="2024-12-13T02:06:11.691431291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:11.725222 env[1220]: time="2024-12-13T02:06:11.725117519Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:11.725527 env[1220]: time="2024-12-13T02:06:11.725465503Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:11.725770 env[1220]: time="2024-12-13T02:06:11.725718500Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:11.727628 env[1220]: time="2024-12-13T02:06:11.727494889Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0289bbfda584ae5875dec386d0b319068e614ad3a4b76971b8a821ec56c1fa97 pid=1650 runtime=io.containerd.runc.v2 Dec 13 02:06:11.728342 env[1220]: time="2024-12-13T02:06:11.728236945Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:11.728562 env[1220]: time="2024-12-13T02:06:11.728515686Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:11.728791 env[1220]: time="2024-12-13T02:06:11.728723414Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:11.729703 env[1220]: time="2024-12-13T02:06:11.729610180Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e pid=1652 runtime=io.containerd.runc.v2 Dec 13 02:06:11.749284 systemd[1]: Started cri-containerd-0289bbfda584ae5875dec386d0b319068e614ad3a4b76971b8a821ec56c1fa97.scope. Dec 13 02:06:11.766713 kubelet[1569]: E1213 02:06:11.766155 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:11.768500 systemd[1]: Started cri-containerd-a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e.scope. Dec 13 02:06:11.807398 kernel: kauditd_printk_skb: 276 callbacks suppressed Dec 13 02:06:11.807587 kernel: audit: type=1400 audit(1734055571.780:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828892 kernel: audit: type=1400 audit(1734055571.780:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.864764 env[1220]: time="2024-12-13T02:06:11.864703544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lzx9c,Uid:741b60da-4ece-43c9-b212-48df9b641bc8,Namespace:kube-system,Attempt:0,} returns sandbox id \"0289bbfda584ae5875dec386d0b319068e614ad3a4b76971b8a821ec56c1fa97\"" Dec 13 02:06:11.869117 env[1220]: time="2024-12-13T02:06:11.869073463Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 02:06:11.876404 kernel: audit: type=1400 audit(1734055571.780:437): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.876551 kernel: audit: type=1400 audit(1734055571.780:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.897856 kernel: audit: type=1400 audit(1734055571.780:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.897910 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:06:11.924479 kernel: audit: type=1400 audit(1734055571.780:440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.924662 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 02:06:11.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.935294 kernel: audit: backlog limit exceeded Dec 13 02:06:11.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit: BPF prog-id=61 op=LOAD Dec 13 02:06:11.958724 kernel: audit: type=1400 audit(1734055571.780:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1650 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383962626664613538346165353837356465633338366430623331 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1650 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383962626664613538346165353837356465633338366430623331 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.807000 audit: BPF prog-id=62 op=LOAD Dec 13 02:06:11.807000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003047b0 items=0 ppid=1650 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383962626664613538346165353837356465633338366430623331 Dec 13 02:06:11.828000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.828000 audit: BPF prog-id=63 op=LOAD Dec 13 02:06:11.828000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003047f8 items=0 ppid=1650 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383962626664613538346165353837356465633338366430623331 Dec 13 02:06:11.829000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:06:11.829000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.829000 audit: BPF prog-id=64 op=LOAD Dec 13 02:06:11.829000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000304c08 items=0 ppid=1650 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383962626664613538346165353837356465633338366430623331 Dec 13 02:06:11.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.959000 audit: BPF prog-id=65 op=LOAD Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1652 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343532363133633661626462373233613334366665663631623236 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1652 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343532363133633661626462373233613334366665663631623236 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit: BPF prog-id=66 op=LOAD Dec 13 02:06:11.960000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000396030 items=0 ppid=1652 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343532363133633661626462373233613334366665663631623236 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit: BPF prog-id=67 op=LOAD Dec 13 02:06:11.960000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000396078 items=0 ppid=1652 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343532363133633661626462373233613334366665663631623236 Dec 13 02:06:11.960000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:06:11.960000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:11.960000 audit: BPF prog-id=68 op=LOAD Dec 13 02:06:11.960000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000396488 items=0 ppid=1652 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343532363133633661626462373233613334366665663631623236 Dec 13 02:06:11.975878 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2970495019.mount: Deactivated successfully. Dec 13 02:06:11.993303 env[1220]: time="2024-12-13T02:06:11.993243838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pkkc4,Uid:94b816d2-bd05-4afb-8a4e-230ce84a964d,Namespace:calico-system,Attempt:0,} returns sandbox id \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\"" Dec 13 02:06:12.767190 kubelet[1569]: E1213 02:06:12.767114 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:12.966843 kubelet[1569]: E1213 02:06:12.966278 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9p8wk" podUID="13181872-b83c-4024-b2db-b96f8866cd4f" Dec 13 02:06:13.110130 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount496231393.mount: Deactivated successfully. Dec 13 02:06:13.768354 kubelet[1569]: E1213 02:06:13.768216 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:13.813057 env[1220]: time="2024-12-13T02:06:13.812987573Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:13.816028 env[1220]: time="2024-12-13T02:06:13.815969280Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:13.818333 env[1220]: time="2024-12-13T02:06:13.818286319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:13.820353 env[1220]: time="2024-12-13T02:06:13.820305352Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:13.821089 env[1220]: time="2024-12-13T02:06:13.821034274Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 02:06:13.823006 env[1220]: time="2024-12-13T02:06:13.822944980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:06:13.825034 env[1220]: time="2024-12-13T02:06:13.824983020Z" level=info msg="CreateContainer within sandbox \"0289bbfda584ae5875dec386d0b319068e614ad3a4b76971b8a821ec56c1fa97\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:06:13.850837 env[1220]: time="2024-12-13T02:06:13.850786428Z" level=info msg="CreateContainer within sandbox \"0289bbfda584ae5875dec386d0b319068e614ad3a4b76971b8a821ec56c1fa97\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c986c9398374cd58163e2406587f08eddfe26a7da68ac97ae436ca3cb471bec0\"" Dec 13 02:06:13.852067 env[1220]: time="2024-12-13T02:06:13.852010633Z" level=info msg="StartContainer for \"c986c9398374cd58163e2406587f08eddfe26a7da68ac97ae436ca3cb471bec0\"" Dec 13 02:06:13.892930 systemd[1]: Started cri-containerd-c986c9398374cd58163e2406587f08eddfe26a7da68ac97ae436ca3cb471bec0.scope. Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8e1c544138 items=0 ppid=1650 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:13.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339383663393339383337346364353831363365323430363538376630 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit: BPF prog-id=69 op=LOAD Dec 13 02:06:13.921000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000183728 items=0 ppid=1650 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:13.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339383663393339383337346364353831363365323430363538376630 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.921000 audit: BPF prog-id=70 op=LOAD Dec 13 02:06:13.921000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000183778 items=0 ppid=1650 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:13.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339383663393339383337346364353831363365323430363538376630 Dec 13 02:06:13.921000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:06:13.922000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:13.922000 audit: BPF prog-id=71 op=LOAD Dec 13 02:06:13.922000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000183808 items=0 ppid=1650 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:13.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339383663393339383337346364353831363365323430363538376630 Dec 13 02:06:13.942133 env[1220]: time="2024-12-13T02:06:13.942013572Z" level=info msg="StartContainer for \"c986c9398374cd58163e2406587f08eddfe26a7da68ac97ae436ca3cb471bec0\" returns successfully" Dec 13 02:06:14.036000 audit[1776]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.036000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0feea0c0 a2=0 a3=7ffc0feea0ac items=0 ppid=1738 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:06:14.041000 audit[1777]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.041000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8bcf1380 a2=0 a3=7fff8bcf136c items=0 ppid=1738 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:06:14.042000 audit[1778]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.042000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe634feec0 a2=0 a3=7ffe634feeac items=0 ppid=1738 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:06:14.042000 audit[1779]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.042000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf0b43300 a2=0 a3=7ffdf0b432ec items=0 ppid=1738 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:06:14.046000 audit[1780]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.047293 kubelet[1569]: E1213 02:06:14.047258 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.047424 kubelet[1569]: W1213 02:06:14.047293 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.047424 kubelet[1569]: E1213 02:06:14.047326 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.046000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc66ebd270 a2=0 a3=7ffc66ebd25c items=0 ppid=1738 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:06:14.048201 kubelet[1569]: E1213 02:06:14.048173 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.048201 kubelet[1569]: W1213 02:06:14.048200 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.048364 kubelet[1569]: E1213 02:06:14.048244 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.048652 kubelet[1569]: E1213 02:06:14.048616 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.048652 kubelet[1569]: W1213 02:06:14.048648 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.048870 kubelet[1569]: E1213 02:06:14.048668 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.049192 kubelet[1569]: E1213 02:06:14.049168 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.049281 kubelet[1569]: W1213 02:06:14.049201 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.049281 kubelet[1569]: E1213 02:06:14.049222 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.049740 kubelet[1569]: E1213 02:06:14.049718 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.049740 kubelet[1569]: W1213 02:06:14.049739 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.049909 kubelet[1569]: E1213 02:06:14.049766 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.050086 kubelet[1569]: E1213 02:06:14.050061 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.050086 kubelet[1569]: W1213 02:06:14.050083 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.050240 kubelet[1569]: E1213 02:06:14.050101 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.050397 kubelet[1569]: E1213 02:06:14.050376 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.050493 kubelet[1569]: W1213 02:06:14.050397 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.050493 kubelet[1569]: E1213 02:06:14.050425 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.051149 kubelet[1569]: E1213 02:06:14.050757 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.051149 kubelet[1569]: W1213 02:06:14.050775 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.051149 kubelet[1569]: E1213 02:06:14.050790 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.051362 kubelet[1569]: E1213 02:06:14.051328 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.051362 kubelet[1569]: W1213 02:06:14.051343 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.051362 kubelet[1569]: E1213 02:06:14.051360 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.051760 kubelet[1569]: E1213 02:06:14.051642 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.051760 kubelet[1569]: W1213 02:06:14.051657 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.051760 kubelet[1569]: E1213 02:06:14.051673 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.052000 audit[1783]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.052000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccd22da10 a2=0 a3=7ffccd22d9fc items=0 ppid=1738 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:06:14.054022 kubelet[1569]: E1213 02:06:14.052207 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.054022 kubelet[1569]: W1213 02:06:14.052225 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.054022 kubelet[1569]: E1213 02:06:14.052258 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.054022 kubelet[1569]: E1213 02:06:14.052565 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.054022 kubelet[1569]: W1213 02:06:14.052578 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.054022 kubelet[1569]: E1213 02:06:14.052593 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.054022 kubelet[1569]: E1213 02:06:14.053042 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.054022 kubelet[1569]: W1213 02:06:14.053057 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.054022 kubelet[1569]: E1213 02:06:14.053073 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.054519 kubelet[1569]: E1213 02:06:14.054151 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.054519 kubelet[1569]: W1213 02:06:14.054166 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.054519 kubelet[1569]: E1213 02:06:14.054184 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.054991 kubelet[1569]: E1213 02:06:14.054966 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.054991 kubelet[1569]: W1213 02:06:14.054986 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.055487 kubelet[1569]: E1213 02:06:14.055004 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.055487 kubelet[1569]: E1213 02:06:14.055334 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.055487 kubelet[1569]: W1213 02:06:14.055379 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.055487 kubelet[1569]: E1213 02:06:14.055396 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.056174 kubelet[1569]: E1213 02:06:14.056150 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.056174 kubelet[1569]: W1213 02:06:14.056170 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.056375 kubelet[1569]: E1213 02:06:14.056189 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.056663 kubelet[1569]: E1213 02:06:14.056639 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.056663 kubelet[1569]: W1213 02:06:14.056659 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.057396 kubelet[1569]: E1213 02:06:14.056692 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.057396 kubelet[1569]: E1213 02:06:14.057029 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.057396 kubelet[1569]: W1213 02:06:14.057043 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.057396 kubelet[1569]: E1213 02:06:14.057060 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.057396 kubelet[1569]: E1213 02:06:14.057386 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.057653 kubelet[1569]: W1213 02:06:14.057400 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.057653 kubelet[1569]: E1213 02:06:14.057416 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.110327 systemd[1]: run-containerd-runc-k8s.io-c986c9398374cd58163e2406587f08eddfe26a7da68ac97ae436ca3cb471bec0-runc.GejkHD.mount: Deactivated successfully. Dec 13 02:06:14.140000 audit[1802]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.140000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcd0d6f250 a2=0 a3=7ffcd0d6f23c items=0 ppid=1738 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:06:14.144000 audit[1804]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.144000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdd99c2120 a2=0 a3=7ffdd99c210c items=0 ppid=1738 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.144000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:06:14.146850 kubelet[1569]: E1213 02:06:14.146819 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.146850 kubelet[1569]: W1213 02:06:14.146847 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.147047 kubelet[1569]: E1213 02:06:14.146878 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.147338 kubelet[1569]: E1213 02:06:14.147315 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.147492 kubelet[1569]: W1213 02:06:14.147471 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.147619 kubelet[1569]: E1213 02:06:14.147600 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.148153 kubelet[1569]: E1213 02:06:14.148135 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.148346 kubelet[1569]: W1213 02:06:14.148281 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.148346 kubelet[1569]: E1213 02:06:14.148339 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.150918 kubelet[1569]: E1213 02:06:14.148728 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.150918 kubelet[1569]: W1213 02:06:14.148746 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.150918 kubelet[1569]: E1213 02:06:14.148774 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.150918 kubelet[1569]: E1213 02:06:14.149100 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.150918 kubelet[1569]: W1213 02:06:14.149114 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.150918 kubelet[1569]: E1213 02:06:14.149131 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.150918 kubelet[1569]: E1213 02:06:14.149436 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.150918 kubelet[1569]: W1213 02:06:14.149448 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.150918 kubelet[1569]: E1213 02:06:14.149464 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.150918 kubelet[1569]: E1213 02:06:14.150020 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.151353 kubelet[1569]: W1213 02:06:14.150035 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.151353 kubelet[1569]: E1213 02:06:14.150051 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.151353 kubelet[1569]: E1213 02:06:14.150329 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.151353 kubelet[1569]: W1213 02:06:14.150342 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.151353 kubelet[1569]: E1213 02:06:14.150358 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.151353 kubelet[1569]: E1213 02:06:14.150642 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.151353 kubelet[1569]: W1213 02:06:14.150657 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.151353 kubelet[1569]: E1213 02:06:14.150674 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.151787 kubelet[1569]: E1213 02:06:14.151757 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.151787 kubelet[1569]: W1213 02:06:14.151786 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.151958 kubelet[1569]: E1213 02:06:14.151805 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.152840 kubelet[1569]: E1213 02:06:14.152812 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.152840 kubelet[1569]: W1213 02:06:14.152836 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.152997 kubelet[1569]: E1213 02:06:14.152854 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.154000 audit[1818]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.154000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdca65b210 a2=0 a3=7ffdca65b1fc items=0 ppid=1738 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:06:14.155361 kubelet[1569]: E1213 02:06:14.155337 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:14.155361 kubelet[1569]: W1213 02:06:14.155361 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:14.155489 kubelet[1569]: E1213 02:06:14.155379 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:14.156000 audit[1820]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.156000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcedd873f0 a2=0 a3=7ffcedd873dc items=0 ppid=1738 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:06:14.160000 audit[1822]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.160000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc5d4e370 a2=0 a3=7ffdc5d4e35c items=0 ppid=1738 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.160000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:06:14.162000 audit[1823]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.162000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbd62bdb0 a2=0 a3=7fffbd62bd9c items=0 ppid=1738 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:06:14.165000 audit[1825]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.165000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd459c78d0 a2=0 a3=7ffd459c78bc items=0 ppid=1738 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:06:14.171000 audit[1828]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.171000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc120ee350 a2=0 a3=7ffc120ee33c items=0 ppid=1738 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:06:14.173000 audit[1829]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.173000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaf2af210 a2=0 a3=7ffcaf2af1fc items=0 ppid=1738 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:06:14.176000 audit[1831]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.176000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd23cf3830 a2=0 a3=7ffd23cf381c items=0 ppid=1738 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:06:14.178000 audit[1832]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.178000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd6e27350 a2=0 a3=7fffd6e2733c items=0 ppid=1738 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:06:14.183000 audit[1834]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.183000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2235e190 a2=0 a3=7fff2235e17c items=0 ppid=1738 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:06:14.189000 audit[1837]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.189000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff38bd57a0 a2=0 a3=7fff38bd578c items=0 ppid=1738 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:06:14.194000 audit[1840]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.194000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdfd52000 a2=0 a3=7fffdfd51fec items=0 ppid=1738 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.194000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:06:14.196000 audit[1841]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.196000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce9d04540 a2=0 a3=7ffce9d0452c items=0 ppid=1738 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:06:14.200000 audit[1843]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.200000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffef3b6840 a2=0 a3=7fffef3b682c items=0 ppid=1738 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:06:14.232000 audit[1848]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.232000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc604281b0 a2=0 a3=7ffc6042819c items=0 ppid=1738 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:06:14.234000 audit[1849]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.234000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc99fbf190 a2=0 a3=7ffc99fbf17c items=0 ppid=1738 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:06:14.238000 audit[1851]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:14.238000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdaa9ad500 a2=0 a3=7ffdaa9ad4ec items=0 ppid=1738 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:06:14.256000 audit[1857]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:14.256000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff225b44f0 a2=0 a3=7fff225b44dc items=0 ppid=1738 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:14.286000 audit[1857]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:14.286000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7fff225b44f0 a2=0 a3=7fff225b44dc items=0 ppid=1738 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.286000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:14.310000 audit[1866]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.310000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff2b9efdd0 a2=0 a3=7fff2b9efdbc items=0 ppid=1738 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:06:14.316000 audit[1868]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.316000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc082964c0 a2=0 a3=7ffc082964ac items=0 ppid=1738 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:06:14.322000 audit[1871]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.322000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff028f9420 a2=0 a3=7fff028f940c items=0 ppid=1738 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:06:14.324000 audit[1872]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.324000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1c0f3d40 a2=0 a3=7fff1c0f3d2c items=0 ppid=1738 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:06:14.328000 audit[1874]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.328000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff67abc3f0 a2=0 a3=7fff67abc3dc items=0 ppid=1738 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:06:14.329000 audit[1875]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.329000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe59813cd0 a2=0 a3=7ffe59813cbc items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:06:14.333000 audit[1877]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.333000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde6816b30 a2=0 a3=7ffde6816b1c items=0 ppid=1738 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:06:14.338000 audit[1880]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.338000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd07709940 a2=0 a3=7ffd0770992c items=0 ppid=1738 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:06:14.340000 audit[1881]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.340000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe37f7ae10 a2=0 a3=7ffe37f7adfc items=0 ppid=1738 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:06:14.344000 audit[1883]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.344000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe41a6d8d0 a2=0 a3=7ffe41a6d8bc items=0 ppid=1738 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:06:14.346000 audit[1884]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.346000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff36bb57a0 a2=0 a3=7fff36bb578c items=0 ppid=1738 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:06:14.350000 audit[1886]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1886 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.350000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc0056820 a2=0 a3=7ffdc005680c items=0 ppid=1738 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:06:14.355000 audit[1889]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.355000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff80d88a30 a2=0 a3=7fff80d88a1c items=0 ppid=1738 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.355000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:06:14.362000 audit[1892]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1892 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.362000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf97f45b0 a2=0 a3=7ffdf97f459c items=0 ppid=1738 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:06:14.364000 audit[1893]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.364000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc3972b090 a2=0 a3=7ffc3972b07c items=0 ppid=1738 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:06:14.367000 audit[1895]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.367000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff67431db0 a2=0 a3=7fff67431d9c items=0 ppid=1738 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:06:14.372000 audit[1898]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.372000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff666d5380 a2=0 a3=7fff666d536c items=0 ppid=1738 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:06:14.374000 audit[1899]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.374000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeadaf9d60 a2=0 a3=7ffeadaf9d4c items=0 ppid=1738 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:06:14.378000 audit[1901]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.378000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcc95ba620 a2=0 a3=7ffcc95ba60c items=0 ppid=1738 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:06:14.379000 audit[1902]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.379000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc79988320 a2=0 a3=7ffc7998830c items=0 ppid=1738 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:06:14.386000 audit[1904]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.386000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff5eea2400 a2=0 a3=7fff5eea23ec items=0 ppid=1738 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:06:14.392000 audit[1907]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:14.392000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe26475670 a2=0 a3=7ffe2647565c items=0 ppid=1738 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:06:14.396000 audit[1909]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1909 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:06:14.396000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffdd1621030 a2=0 a3=7ffdd162101c items=0 ppid=1738 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.396000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:14.397000 audit[1909]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:06:14.397000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdd1621030 a2=0 a3=7ffdd162101c items=0 ppid=1738 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:14.397000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:14.768988 kubelet[1569]: E1213 02:06:14.768923 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:14.837981 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount10224651.mount: Deactivated successfully. Dec 13 02:06:14.967008 kubelet[1569]: E1213 02:06:14.966943 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9p8wk" podUID="13181872-b83c-4024-b2db-b96f8866cd4f" Dec 13 02:06:15.009288 env[1220]: time="2024-12-13T02:06:15.009217504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:15.012164 env[1220]: time="2024-12-13T02:06:15.012092095Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:15.015187 env[1220]: time="2024-12-13T02:06:15.015123586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:15.017732 env[1220]: time="2024-12-13T02:06:15.017670527Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:15.018118 env[1220]: time="2024-12-13T02:06:15.018075056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:06:15.022614 env[1220]: time="2024-12-13T02:06:15.022101275Z" level=info msg="CreateContainer within sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:06:15.043056 env[1220]: time="2024-12-13T02:06:15.042989393Z" level=info msg="CreateContainer within sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\"" Dec 13 02:06:15.044366 env[1220]: time="2024-12-13T02:06:15.044311345Z" level=info msg="StartContainer for \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\"" Dec 13 02:06:15.065733 kubelet[1569]: E1213 02:06:15.065675 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.065733 kubelet[1569]: W1213 02:06:15.065730 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.066019 kubelet[1569]: E1213 02:06:15.065762 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.066394 kubelet[1569]: E1213 02:06:15.066368 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.066394 kubelet[1569]: W1213 02:06:15.066390 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.066580 kubelet[1569]: E1213 02:06:15.066411 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.066946 kubelet[1569]: E1213 02:06:15.066920 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.066946 kubelet[1569]: W1213 02:06:15.066944 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.067111 kubelet[1569]: E1213 02:06:15.066964 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.067451 kubelet[1569]: E1213 02:06:15.067427 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.067451 kubelet[1569]: W1213 02:06:15.067450 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.067607 kubelet[1569]: E1213 02:06:15.067471 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.069286 kubelet[1569]: E1213 02:06:15.067992 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.069286 kubelet[1569]: W1213 02:06:15.068007 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.069286 kubelet[1569]: E1213 02:06:15.068026 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.069286 kubelet[1569]: E1213 02:06:15.068345 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.069286 kubelet[1569]: W1213 02:06:15.068358 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.069286 kubelet[1569]: E1213 02:06:15.068377 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.069286 kubelet[1569]: E1213 02:06:15.068711 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.069286 kubelet[1569]: W1213 02:06:15.068725 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.069286 kubelet[1569]: E1213 02:06:15.068742 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.071533 kubelet[1569]: E1213 02:06:15.070064 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.071533 kubelet[1569]: W1213 02:06:15.070082 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.071533 kubelet[1569]: E1213 02:06:15.070101 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.071533 kubelet[1569]: E1213 02:06:15.070451 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.071533 kubelet[1569]: W1213 02:06:15.070465 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.071533 kubelet[1569]: E1213 02:06:15.070484 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.071533 kubelet[1569]: E1213 02:06:15.070821 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.071533 kubelet[1569]: W1213 02:06:15.070836 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.071533 kubelet[1569]: E1213 02:06:15.070853 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.071533 kubelet[1569]: E1213 02:06:15.071133 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.072101 kubelet[1569]: W1213 02:06:15.071144 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.072101 kubelet[1569]: E1213 02:06:15.071158 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.072101 kubelet[1569]: E1213 02:06:15.071400 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.072101 kubelet[1569]: W1213 02:06:15.071410 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.072101 kubelet[1569]: E1213 02:06:15.071423 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.073185 kubelet[1569]: E1213 02:06:15.072716 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.073185 kubelet[1569]: W1213 02:06:15.072733 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.073185 kubelet[1569]: E1213 02:06:15.072751 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.073185 kubelet[1569]: E1213 02:06:15.073045 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.073185 kubelet[1569]: W1213 02:06:15.073057 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.073185 kubelet[1569]: E1213 02:06:15.073080 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.073631 systemd[1]: Started cri-containerd-b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015.scope. Dec 13 02:06:15.074099 kubelet[1569]: E1213 02:06:15.073790 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.074099 kubelet[1569]: W1213 02:06:15.073804 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.074099 kubelet[1569]: E1213 02:06:15.073831 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.074511 kubelet[1569]: E1213 02:06:15.074492 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.074831 kubelet[1569]: W1213 02:06:15.074636 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.074831 kubelet[1569]: E1213 02:06:15.074666 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.075235 kubelet[1569]: E1213 02:06:15.075216 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.075365 kubelet[1569]: W1213 02:06:15.075346 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.075481 kubelet[1569]: E1213 02:06:15.075461 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.075943 kubelet[1569]: E1213 02:06:15.075925 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.079710 kubelet[1569]: W1213 02:06:15.078763 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.079710 kubelet[1569]: E1213 02:06:15.078807 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.083719 kubelet[1569]: E1213 02:06:15.080725 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.083719 kubelet[1569]: W1213 02:06:15.080748 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.083719 kubelet[1569]: E1213 02:06:15.080768 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.085723 kubelet[1569]: E1213 02:06:15.084195 1569 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:15.085723 kubelet[1569]: W1213 02:06:15.084219 1569 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:15.085723 kubelet[1569]: E1213 02:06:15.084246 1569 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f590423acb8 items=0 ppid=1652 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:15.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235393161653265363733356235373635646633353831303131656131 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit: BPF prog-id=72 op=LOAD Dec 13 02:06:15.103000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000394088 items=0 ppid=1652 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:15.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235393161653265363733356235373635646633353831303131656131 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit: BPF prog-id=73 op=LOAD Dec 13 02:06:15.103000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003940d8 items=0 ppid=1652 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:15.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235393161653265363733356235373635646633353831303131656131 Dec 13 02:06:15.103000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:06:15.103000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.103000 audit: BPF prog-id=74 op=LOAD Dec 13 02:06:15.103000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000394168 items=0 ppid=1652 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:15.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235393161653265363733356235373635646633353831303131656131 Dec 13 02:06:15.129755 env[1220]: time="2024-12-13T02:06:15.128522378Z" level=info msg="StartContainer for \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\" returns successfully" Dec 13 02:06:15.145268 systemd[1]: cri-containerd-b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015.scope: Deactivated successfully. Dec 13 02:06:15.149000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:06:15.188374 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015-rootfs.mount: Deactivated successfully. Dec 13 02:06:15.559357 env[1220]: time="2024-12-13T02:06:15.559288161Z" level=info msg="shim disconnected" id=b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015 Dec 13 02:06:15.559357 env[1220]: time="2024-12-13T02:06:15.559357920Z" level=warning msg="cleaning up after shim disconnected" id=b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015 namespace=k8s.io Dec 13 02:06:15.559782 env[1220]: time="2024-12-13T02:06:15.559373120Z" level=info msg="cleaning up dead shim" Dec 13 02:06:15.572006 env[1220]: time="2024-12-13T02:06:15.571923313Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1980 runtime=io.containerd.runc.v2\n" Dec 13 02:06:15.769476 kubelet[1569]: E1213 02:06:15.769384 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:15.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:15.988337 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 02:06:15.991648 env[1220]: time="2024-12-13T02:06:15.991572231Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:06:16.008000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:06:16.008000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:06:16.008000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:06:16.009058 kubelet[1569]: I1213 02:06:16.008445 1569 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-lzx9c" podStartSLOduration=5.053854736 podStartE2EDuration="7.008421164s" podCreationTimestamp="2024-12-13 02:06:09 +0000 UTC" firstStartedPulling="2024-12-13 02:06:11.868052408 +0000 UTC m=+2.749880497" lastFinishedPulling="2024-12-13 02:06:13.822618836 +0000 UTC m=+4.704446925" observedRunningTime="2024-12-13 02:06:13.99592396 +0000 UTC m=+4.877752060" watchObservedRunningTime="2024-12-13 02:06:16.008421164 +0000 UTC m=+6.890249263" Dec 13 02:06:16.769737 kubelet[1569]: E1213 02:06:16.769669 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:16.967313 kubelet[1569]: E1213 02:06:16.967073 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9p8wk" podUID="13181872-b83c-4024-b2db-b96f8866cd4f" Dec 13 02:06:17.770031 kubelet[1569]: E1213 02:06:17.769951 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:18.770735 kubelet[1569]: E1213 02:06:18.770662 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:18.966722 kubelet[1569]: E1213 02:06:18.966645 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9p8wk" podUID="13181872-b83c-4024-b2db-b96f8866cd4f" Dec 13 02:06:19.771184 kubelet[1569]: E1213 02:06:19.771130 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:20.238811 env[1220]: time="2024-12-13T02:06:20.238741561Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:20.241321 env[1220]: time="2024-12-13T02:06:20.241267734Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:20.243602 env[1220]: time="2024-12-13T02:06:20.243555766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:20.245808 env[1220]: time="2024-12-13T02:06:20.245763651Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:20.246411 env[1220]: time="2024-12-13T02:06:20.246357234Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:06:20.249645 env[1220]: time="2024-12-13T02:06:20.249602314Z" level=info msg="CreateContainer within sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:06:20.266532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount124931839.mount: Deactivated successfully. Dec 13 02:06:20.277098 env[1220]: time="2024-12-13T02:06:20.277027618Z" level=info msg="CreateContainer within sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\"" Dec 13 02:06:20.277772 env[1220]: time="2024-12-13T02:06:20.277670770Z" level=info msg="StartContainer for \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\"" Dec 13 02:06:20.313331 systemd[1]: run-containerd-runc-k8s.io-c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0-runc.JRxmNX.mount: Deactivated successfully. Dec 13 02:06:20.319591 systemd[1]: Started cri-containerd-c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0.scope. Dec 13 02:06:20.371672 kernel: kauditd_printk_skb: 350 callbacks suppressed Dec 13 02:06:20.371903 kernel: audit: type=1400 audit(1734055580.343:538): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efcec0a0698 items=0 ppid=1652 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:20.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331353836663864366434636263366139616230623239396137323031 Dec 13 02:06:20.433709 kernel: audit: type=1300 audit(1734055580.343:538): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efcec0a0698 items=0 ppid=1652 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:20.433901 kernel: audit: type=1327 audit(1734055580.343:538): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331353836663864366434636263366139616230623239396137323031 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.478333 kernel: audit: type=1400 audit(1734055580.343:539): avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.478611 kernel: audit: type=1400 audit(1734055580.343:539): avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.520453 kernel: audit: type=1400 audit(1734055580.343:539): avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.520770 kernel: audit: type=1400 audit(1734055580.343:539): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.520859 kernel: audit: type=1400 audit(1734055580.343:539): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.542292 kernel: audit: type=1400 audit(1734055580.343:539): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.543650 env[1220]: time="2024-12-13T02:06:20.543590493Z" level=info msg="StartContainer for \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\" returns successfully" Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit: BPF prog-id=75 op=LOAD Dec 13 02:06:20.584825 kernel: audit: type=1400 audit(1734055580.343:539): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.343000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000368578 items=0 ppid=1652 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:20.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331353836663864366434636263366139616230623239396137323031 Dec 13 02:06:20.349000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.349000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.349000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.349000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.349000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.349000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.349000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.349000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.349000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.349000 audit: BPF prog-id=76 op=LOAD Dec 13 02:06:20.349000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003685c8 items=0 ppid=1652 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:20.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331353836663864366434636263366139616230623239396137323031 Dec 13 02:06:20.370000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:06:20.370000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:20.370000 audit: BPF prog-id=77 op=LOAD Dec 13 02:06:20.370000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000368658 items=0 ppid=1652 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:20.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331353836663864366434636263366139616230623239396137323031 Dec 13 02:06:20.771740 kubelet[1569]: E1213 02:06:20.771562 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:20.966672 kubelet[1569]: E1213 02:06:20.966144 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9p8wk" podUID="13181872-b83c-4024-b2db-b96f8866cd4f" Dec 13 02:06:21.416330 env[1220]: time="2024-12-13T02:06:21.416247537Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:06:21.418934 systemd[1]: cri-containerd-c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0.scope: Deactivated successfully. Dec 13 02:06:21.424000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:06:21.451295 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0-rootfs.mount: Deactivated successfully. Dec 13 02:06:21.487276 kubelet[1569]: I1213 02:06:21.487099 1569 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:06:21.772695 kubelet[1569]: E1213 02:06:21.772528 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:22.219615 env[1220]: time="2024-12-13T02:06:22.219542987Z" level=info msg="shim disconnected" id=c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0 Dec 13 02:06:22.219615 env[1220]: time="2024-12-13T02:06:22.219618141Z" level=warning msg="cleaning up after shim disconnected" id=c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0 namespace=k8s.io Dec 13 02:06:22.219987 env[1220]: time="2024-12-13T02:06:22.219632597Z" level=info msg="cleaning up dead shim" Dec 13 02:06:22.232652 env[1220]: time="2024-12-13T02:06:22.232573731Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2041 runtime=io.containerd.runc.v2\n" Dec 13 02:06:22.773035 kubelet[1569]: E1213 02:06:22.772969 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:22.973240 systemd[1]: Created slice kubepods-besteffort-pod13181872_b83c_4024_b2db_b96f8866cd4f.slice. Dec 13 02:06:22.976899 env[1220]: time="2024-12-13T02:06:22.976844432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9p8wk,Uid:13181872-b83c-4024-b2db-b96f8866cd4f,Namespace:calico-system,Attempt:0,}" Dec 13 02:06:23.024432 env[1220]: time="2024-12-13T02:06:23.023927994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:06:23.035965 kubelet[1569]: I1213 02:06:23.035919 1569 topology_manager.go:215] "Topology Admit Handler" podUID="bd2ec361-43e4-4217-a0ff-5fd487160d13" podNamespace="default" podName="nginx-deployment-85f456d6dd-kp89t" Dec 13 02:06:23.043870 systemd[1]: Created slice kubepods-besteffort-podbd2ec361_43e4_4217_a0ff_5fd487160d13.slice. Dec 13 02:06:23.086847 env[1220]: time="2024-12-13T02:06:23.086732718Z" level=error msg="Failed to destroy network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:23.091378 env[1220]: time="2024-12-13T02:06:23.087248636Z" level=error msg="encountered an error cleaning up failed sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:23.091378 env[1220]: time="2024-12-13T02:06:23.087340890Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9p8wk,Uid:13181872-b83c-4024-b2db-b96f8866cd4f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:23.089582 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950-shm.mount: Deactivated successfully. Dec 13 02:06:23.091644 kubelet[1569]: E1213 02:06:23.087651 1569 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:23.091644 kubelet[1569]: E1213 02:06:23.087784 1569 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9p8wk" Dec 13 02:06:23.091644 kubelet[1569]: E1213 02:06:23.087819 1569 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9p8wk" Dec 13 02:06:23.091936 kubelet[1569]: E1213 02:06:23.087881 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9p8wk_calico-system(13181872-b83c-4024-b2db-b96f8866cd4f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9p8wk_calico-system(13181872-b83c-4024-b2db-b96f8866cd4f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9p8wk" podUID="13181872-b83c-4024-b2db-b96f8866cd4f" Dec 13 02:06:23.122596 kubelet[1569]: I1213 02:06:23.121843 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pgt7l\" (UniqueName: \"kubernetes.io/projected/bd2ec361-43e4-4217-a0ff-5fd487160d13-kube-api-access-pgt7l\") pod \"nginx-deployment-85f456d6dd-kp89t\" (UID: \"bd2ec361-43e4-4217-a0ff-5fd487160d13\") " pod="default/nginx-deployment-85f456d6dd-kp89t" Dec 13 02:06:23.350441 env[1220]: time="2024-12-13T02:06:23.350282252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-kp89t,Uid:bd2ec361-43e4-4217-a0ff-5fd487160d13,Namespace:default,Attempt:0,}" Dec 13 02:06:23.433643 env[1220]: time="2024-12-13T02:06:23.433560076Z" level=error msg="Failed to destroy network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:23.434353 env[1220]: time="2024-12-13T02:06:23.434292265Z" level=error msg="encountered an error cleaning up failed sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:23.434524 env[1220]: time="2024-12-13T02:06:23.434380947Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-kp89t,Uid:bd2ec361-43e4-4217-a0ff-5fd487160d13,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:23.434759 kubelet[1569]: E1213 02:06:23.434702 1569 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:23.434901 kubelet[1569]: E1213 02:06:23.434794 1569 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-kp89t" Dec 13 02:06:23.434901 kubelet[1569]: E1213 02:06:23.434826 1569 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-kp89t" Dec 13 02:06:23.435028 kubelet[1569]: E1213 02:06:23.434883 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-kp89t_default(bd2ec361-43e4-4217-a0ff-5fd487160d13)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-kp89t_default(bd2ec361-43e4-4217-a0ff-5fd487160d13)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-kp89t" podUID="bd2ec361-43e4-4217-a0ff-5fd487160d13" Dec 13 02:06:23.773424 kubelet[1569]: E1213 02:06:23.773372 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:23.991337 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0-shm.mount: Deactivated successfully. Dec 13 02:06:24.019832 kubelet[1569]: I1213 02:06:24.019782 1569 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:06:24.020716 env[1220]: time="2024-12-13T02:06:24.020648965Z" level=info msg="StopPodSandbox for \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\"" Dec 13 02:06:24.033299 kubelet[1569]: I1213 02:06:24.032712 1569 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:06:24.034333 env[1220]: time="2024-12-13T02:06:24.034284475Z" level=info msg="StopPodSandbox for \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\"" Dec 13 02:06:24.116052 env[1220]: time="2024-12-13T02:06:24.115968906Z" level=error msg="StopPodSandbox for \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\" failed" error="failed to destroy network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:24.116735 kubelet[1569]: E1213 02:06:24.116647 1569 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:06:24.116900 kubelet[1569]: E1213 02:06:24.116763 1569 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950"} Dec 13 02:06:24.116900 kubelet[1569]: E1213 02:06:24.116853 1569 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"13181872-b83c-4024-b2db-b96f8866cd4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:06:24.117070 kubelet[1569]: E1213 02:06:24.116893 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"13181872-b83c-4024-b2db-b96f8866cd4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9p8wk" podUID="13181872-b83c-4024-b2db-b96f8866cd4f" Dec 13 02:06:24.152197 env[1220]: time="2024-12-13T02:06:24.152094694Z" level=error msg="StopPodSandbox for \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\" failed" error="failed to destroy network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:24.152468 kubelet[1569]: E1213 02:06:24.152411 1569 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:06:24.152642 kubelet[1569]: E1213 02:06:24.152486 1569 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0"} Dec 13 02:06:24.152642 kubelet[1569]: E1213 02:06:24.152544 1569 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bd2ec361-43e4-4217-a0ff-5fd487160d13\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:06:24.152642 kubelet[1569]: E1213 02:06:24.152578 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bd2ec361-43e4-4217-a0ff-5fd487160d13\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-kp89t" podUID="bd2ec361-43e4-4217-a0ff-5fd487160d13" Dec 13 02:06:24.774184 kubelet[1569]: E1213 02:06:24.774126 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:25.774353 kubelet[1569]: E1213 02:06:25.774282 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:26.294465 kubelet[1569]: I1213 02:06:26.294390 1569 topology_manager.go:215] "Topology Admit Handler" podUID="690011ee-b3d8-4ce5-9474-d544266c099f" podNamespace="calico-system" podName="calico-typha-7747f5cd6-66r4m" Dec 13 02:06:26.302978 systemd[1]: Created slice kubepods-besteffort-pod690011ee_b3d8_4ce5_9474_d544266c099f.slice. Dec 13 02:06:26.370870 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 02:06:26.371063 kernel: audit: type=1325 audit(1734055586.353:545): table=filter:65 family=2 entries=8 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.353000 audit[2158]: NETFILTER_CFG table=filter:65 family=2 entries=8 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.353000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff77cd2a20 a2=0 a3=7fff77cd2a0c items=0 ppid=1738 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.424467 kernel: audit: type=1300 audit(1734055586.353:545): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff77cd2a20 a2=0 a3=7fff77cd2a0c items=0 ppid=1738 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.424635 kernel: audit: type=1327 audit(1734055586.353:545): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.425000 audit[2158]: NETFILTER_CFG table=nat:66 family=2 entries=30 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.425000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff77cd2a20 a2=0 a3=7fff77cd2a0c items=0 ppid=1738 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.442986 kubelet[1569]: I1213 02:06:26.442781 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/690011ee-b3d8-4ce5-9474-d544266c099f-tigera-ca-bundle\") pod \"calico-typha-7747f5cd6-66r4m\" (UID: \"690011ee-b3d8-4ce5-9474-d544266c099f\") " pod="calico-system/calico-typha-7747f5cd6-66r4m" Dec 13 02:06:26.442986 kubelet[1569]: I1213 02:06:26.442858 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/690011ee-b3d8-4ce5-9474-d544266c099f-typha-certs\") pod \"calico-typha-7747f5cd6-66r4m\" (UID: \"690011ee-b3d8-4ce5-9474-d544266c099f\") " pod="calico-system/calico-typha-7747f5cd6-66r4m" Dec 13 02:06:26.442986 kubelet[1569]: I1213 02:06:26.442891 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xbvzg\" (UniqueName: \"kubernetes.io/projected/690011ee-b3d8-4ce5-9474-d544266c099f-kube-api-access-xbvzg\") pod \"calico-typha-7747f5cd6-66r4m\" (UID: \"690011ee-b3d8-4ce5-9474-d544266c099f\") " pod="calico-system/calico-typha-7747f5cd6-66r4m" Dec 13 02:06:26.475241 kernel: audit: type=1325 audit(1734055586.425:546): table=nat:66 family=2 entries=30 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.475409 kernel: audit: type=1300 audit(1734055586.425:546): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff77cd2a20 a2=0 a3=7fff77cd2a0c items=0 ppid=1738 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.475456 kernel: audit: type=1327 audit(1734055586.425:546): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.499000 audit[2160]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.516827 kernel: audit: type=1325 audit(1734055586.499:547): table=filter:67 family=2 entries=8 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.499000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd73ebc040 a2=0 a3=7ffd73ebc02c items=0 ppid=1738 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.570528 kernel: audit: type=1300 audit(1734055586.499:547): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd73ebc040 a2=0 a3=7ffd73ebc02c items=0 ppid=1738 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.570702 kernel: audit: type=1327 audit(1734055586.499:547): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.570755 kernel: audit: type=1325 audit(1734055586.566:548): table=nat:68 family=2 entries=30 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.566000 audit[2160]: NETFILTER_CFG table=nat:68 family=2 entries=30 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.566000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd73ebc040 a2=0 a3=7ffd73ebc02c items=0 ppid=1738 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.609950 env[1220]: time="2024-12-13T02:06:26.609885530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7747f5cd6-66r4m,Uid:690011ee-b3d8-4ce5-9474-d544266c099f,Namespace:calico-system,Attempt:0,}" Dec 13 02:06:26.651921 env[1220]: time="2024-12-13T02:06:26.651814885Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:26.652242 env[1220]: time="2024-12-13T02:06:26.652188662Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:26.652417 env[1220]: time="2024-12-13T02:06:26.652383764Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:26.652917 env[1220]: time="2024-12-13T02:06:26.652803030Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e4ef7c09965a128d466a4609737af9face505b1008caf8a63b10db6e3a4e151 pid=2171 runtime=io.containerd.runc.v2 Dec 13 02:06:26.687531 systemd[1]: Started cri-containerd-9e4ef7c09965a128d466a4609737af9face505b1008caf8a63b10db6e3a4e151.scope. Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.717000 audit: BPF prog-id=78 op=LOAD Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2171 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346566376330393936356131323864343636613436303937333761 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2171 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346566376330393936356131323864343636613436303937333761 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit: BPF prog-id=79 op=LOAD Dec 13 02:06:26.719000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000402a30 items=0 ppid=2171 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346566376330393936356131323864343636613436303937333761 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit: BPF prog-id=80 op=LOAD Dec 13 02:06:26.719000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000402a78 items=0 ppid=2171 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346566376330393936356131323864343636613436303937333761 Dec 13 02:06:26.719000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:06:26.719000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:26.719000 audit: BPF prog-id=81 op=LOAD Dec 13 02:06:26.719000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000402e88 items=0 ppid=2171 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346566376330393936356131323864343636613436303937333761 Dec 13 02:06:26.775161 kubelet[1569]: E1213 02:06:26.775099 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:26.781463 env[1220]: time="2024-12-13T02:06:26.781401678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7747f5cd6-66r4m,Uid:690011ee-b3d8-4ce5-9474-d544266c099f,Namespace:calico-system,Attempt:0,} returns sandbox id \"9e4ef7c09965a128d466a4609737af9face505b1008caf8a63b10db6e3a4e151\"" Dec 13 02:06:27.562132 systemd[1]: run-containerd-runc-k8s.io-9e4ef7c09965a128d466a4609737af9face505b1008caf8a63b10db6e3a4e151-runc.5heP3P.mount: Deactivated successfully. Dec 13 02:06:27.775831 kubelet[1569]: E1213 02:06:27.775753 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:27.793143 kubelet[1569]: I1213 02:06:27.791805 1569 topology_manager.go:215] "Topology Admit Handler" podUID="5bc10486-3a9c-4241-9d17-6cb8085e7bf2" podNamespace="calico-system" podName="calico-kube-controllers-6c9c6cdc4c-t5kwn" Dec 13 02:06:27.801105 systemd[1]: Created slice kubepods-besteffort-pod5bc10486_3a9c_4241_9d17_6cb8085e7bf2.slice. Dec 13 02:06:27.954081 kubelet[1569]: I1213 02:06:27.953987 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5bc10486-3a9c-4241-9d17-6cb8085e7bf2-tigera-ca-bundle\") pod \"calico-kube-controllers-6c9c6cdc4c-t5kwn\" (UID: \"5bc10486-3a9c-4241-9d17-6cb8085e7bf2\") " pod="calico-system/calico-kube-controllers-6c9c6cdc4c-t5kwn" Dec 13 02:06:27.954390 kubelet[1569]: I1213 02:06:27.954366 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vk7m9\" (UniqueName: \"kubernetes.io/projected/5bc10486-3a9c-4241-9d17-6cb8085e7bf2-kube-api-access-vk7m9\") pod \"calico-kube-controllers-6c9c6cdc4c-t5kwn\" (UID: \"5bc10486-3a9c-4241-9d17-6cb8085e7bf2\") " pod="calico-system/calico-kube-controllers-6c9c6cdc4c-t5kwn" Dec 13 02:06:28.106314 env[1220]: time="2024-12-13T02:06:28.106245491Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c9c6cdc4c-t5kwn,Uid:5bc10486-3a9c-4241-9d17-6cb8085e7bf2,Namespace:calico-system,Attempt:0,}" Dec 13 02:06:28.287229 env[1220]: time="2024-12-13T02:06:28.277429817Z" level=error msg="Failed to destroy network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:28.287229 env[1220]: time="2024-12-13T02:06:28.277917482Z" level=error msg="encountered an error cleaning up failed sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:28.287229 env[1220]: time="2024-12-13T02:06:28.278033494Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c9c6cdc4c-t5kwn,Uid:5bc10486-3a9c-4241-9d17-6cb8085e7bf2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:28.287556 kubelet[1569]: E1213 02:06:28.285256 1569 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:28.287556 kubelet[1569]: E1213 02:06:28.285329 1569 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6c9c6cdc4c-t5kwn" Dec 13 02:06:28.287556 kubelet[1569]: E1213 02:06:28.285361 1569 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6c9c6cdc4c-t5kwn" Dec 13 02:06:28.280938 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb-shm.mount: Deactivated successfully. Dec 13 02:06:28.287900 kubelet[1569]: E1213 02:06:28.285423 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6c9c6cdc4c-t5kwn_calico-system(5bc10486-3a9c-4241-9d17-6cb8085e7bf2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6c9c6cdc4c-t5kwn_calico-system(5bc10486-3a9c-4241-9d17-6cb8085e7bf2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6c9c6cdc4c-t5kwn" podUID="5bc10486-3a9c-4241-9d17-6cb8085e7bf2" Dec 13 02:06:28.775942 kubelet[1569]: E1213 02:06:28.775857 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:29.048063 kubelet[1569]: I1213 02:06:29.047455 1569 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:06:29.048987 env[1220]: time="2024-12-13T02:06:29.048937014Z" level=info msg="StopPodSandbox for \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\"" Dec 13 02:06:29.114308 env[1220]: time="2024-12-13T02:06:29.114235501Z" level=error msg="StopPodSandbox for \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\" failed" error="failed to destroy network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:29.115380 kubelet[1569]: E1213 02:06:29.115163 1569 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:06:29.115380 kubelet[1569]: E1213 02:06:29.115223 1569 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb"} Dec 13 02:06:29.115380 kubelet[1569]: E1213 02:06:29.115275 1569 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5bc10486-3a9c-4241-9d17-6cb8085e7bf2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:06:29.115380 kubelet[1569]: E1213 02:06:29.115312 1569 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5bc10486-3a9c-4241-9d17-6cb8085e7bf2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6c9c6cdc4c-t5kwn" podUID="5bc10486-3a9c-4241-9d17-6cb8085e7bf2" Dec 13 02:06:29.763712 kubelet[1569]: E1213 02:06:29.763605 1569 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:29.776370 kubelet[1569]: E1213 02:06:29.776272 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:30.263667 update_engine[1207]: I1213 02:06:30.262795 1207 update_attempter.cc:509] Updating boot flags... Dec 13 02:06:30.650853 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount745294304.mount: Deactivated successfully. Dec 13 02:06:30.684498 env[1220]: time="2024-12-13T02:06:30.684418775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:30.687266 env[1220]: time="2024-12-13T02:06:30.687215616Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:30.689391 env[1220]: time="2024-12-13T02:06:30.689351342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:30.696890 env[1220]: time="2024-12-13T02:06:30.696837918Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:30.697294 env[1220]: time="2024-12-13T02:06:30.697245865Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:06:30.699982 env[1220]: time="2024-12-13T02:06:30.699909605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:06:30.720926 env[1220]: time="2024-12-13T02:06:30.720862312Z" level=info msg="CreateContainer within sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:06:30.745692 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3213940811.mount: Deactivated successfully. Dec 13 02:06:30.753361 env[1220]: time="2024-12-13T02:06:30.753295656Z" level=info msg="CreateContainer within sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\"" Dec 13 02:06:30.753997 env[1220]: time="2024-12-13T02:06:30.753952047Z" level=info msg="StartContainer for \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\"" Dec 13 02:06:30.777563 kubelet[1569]: E1213 02:06:30.777482 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:30.778761 systemd[1]: Started cri-containerd-f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188.scope. Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f2449e502f8 items=0 ppid=1652 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630393236623663643138323164666462353936386137343365393633 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.805000 audit: BPF prog-id=82 op=LOAD Dec 13 02:06:30.805000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000248b8 items=0 ppid=1652 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630393236623663643138323164666462353936386137343365393633 Dec 13 02:06:30.806000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.806000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.806000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.806000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.806000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.806000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.806000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.806000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.806000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.806000 audit: BPF prog-id=83 op=LOAD Dec 13 02:06:30.806000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024908 items=0 ppid=1652 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630393236623663643138323164666462353936386137343365393633 Dec 13 02:06:30.807000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:06:30.807000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.807000 audit: BPF prog-id=84 op=LOAD Dec 13 02:06:30.807000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024998 items=0 ppid=1652 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630393236623663643138323164666462353936386137343365393633 Dec 13 02:06:30.830137 env[1220]: time="2024-12-13T02:06:30.829639656Z" level=info msg="StartContainer for \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\" returns successfully" Dec 13 02:06:30.940548 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:06:30.940778 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:06:30.962000 audit[2327]: NETFILTER_CFG table=filter:69 family=2 entries=9 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:30.962000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe519908c0 a2=0 a3=7ffe519908ac items=0 ppid=1738 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:30.967000 audit[2327]: NETFILTER_CFG table=nat:70 family=2 entries=27 op=nft_unregister_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:30.967000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffe519908c0 a2=0 a3=7ffe519908ac items=0 ppid=1738 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.967000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:31.071225 kubelet[1569]: I1213 02:06:31.070919 1569 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-pkkc4" podStartSLOduration=3.367632331 podStartE2EDuration="22.070893889s" podCreationTimestamp="2024-12-13 02:06:09 +0000 UTC" firstStartedPulling="2024-12-13 02:06:11.99536226 +0000 UTC m=+2.877190348" lastFinishedPulling="2024-12-13 02:06:30.698623817 +0000 UTC m=+21.580451906" observedRunningTime="2024-12-13 02:06:31.070206777 +0000 UTC m=+21.952034875" watchObservedRunningTime="2024-12-13 02:06:31.070893889 +0000 UTC m=+21.952721984" Dec 13 02:06:31.244369 env[1220]: time="2024-12-13T02:06:31.243758810Z" level=info msg="StopContainer for \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\" with timeout 5 (s)" Dec 13 02:06:31.245230 env[1220]: time="2024-12-13T02:06:31.245173737Z" level=info msg="Stop container \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\" with signal terminated" Dec 13 02:06:31.777902 kubelet[1569]: E1213 02:06:31.777850 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:32.402653 kernel: kauditd_printk_skb: 108 callbacks suppressed Dec 13 02:06:32.402840 kernel: audit: type=1400 audit(1734055592.374:575): avc: denied { write } for pid=2433 comm="tee" name="fd" dev="proc" ino=20079 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.374000 audit[2433]: AVC avc: denied { write } for pid=2433 comm="tee" name="fd" dev="proc" ino=20079 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.374000 audit[2433]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6f5919e8 a2=241 a3=1b6 items=1 ppid=2405 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.449845 kernel: audit: type=1300 audit(1734055592.374:575): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6f5919e8 a2=241 a3=1b6 items=1 ppid=2405 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.427000 audit[2445]: AVC avc: denied { write } for pid=2445 comm="tee" name="fd" dev="proc" ino=20704 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.476894 kernel: audit: type=1400 audit(1734055592.427:576): avc: denied { write } for pid=2445 comm="tee" name="fd" dev="proc" ino=20704 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.427000 audit[2445]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff406c29f7 a2=241 a3=1b6 items=1 ppid=2409 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.427000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:06:32.519991 kernel: audit: type=1300 audit(1734055592.427:576): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff406c29f7 a2=241 a3=1b6 items=1 ppid=2409 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.520096 kernel: audit: type=1307 audit(1734055592.427:576): cwd="/etc/service/enabled/bird6/log" Dec 13 02:06:32.427000 audit: PATH item=0 name="/dev/fd/63" inode=20082 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:32.542327 kernel: audit: type=1302 audit(1734055592.427:576): item=0 name="/dev/fd/63" inode=20082 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:32.427000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:32.567725 kernel: audit: type=1327 audit(1734055592.427:576): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:32.434000 audit[2454]: AVC avc: denied { write } for pid=2454 comm="tee" name="fd" dev="proc" ino=20711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.591152 kernel: audit: type=1400 audit(1734055592.434:577): avc: denied { write } for pid=2454 comm="tee" name="fd" dev="proc" ino=20711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.434000 audit[2454]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeaccc09f7 a2=241 a3=1b6 items=1 ppid=2412 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.630879 kernel: audit: type=1300 audit(1734055592.434:577): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeaccc09f7 a2=241 a3=1b6 items=1 ppid=2412 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.434000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:06:32.642728 kernel: audit: type=1307 audit(1734055592.434:577): cwd="/etc/service/enabled/confd/log" Dec 13 02:06:32.434000 audit: PATH item=0 name="/dev/fd/63" inode=20086 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:32.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:32.446000 audit[2440]: AVC avc: denied { write } for pid=2440 comm="tee" name="fd" dev="proc" ino=20714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.446000 audit[2440]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb0d2b9f7 a2=241 a3=1b6 items=1 ppid=2410 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.446000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:06:32.446000 audit: PATH item=0 name="/dev/fd/63" inode=20072 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:32.446000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:32.374000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:06:32.374000 audit: PATH item=0 name="/dev/fd/63" inode=20061 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:32.374000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:32.432000 audit[2452]: AVC avc: denied { write } for pid=2452 comm="tee" name="fd" dev="proc" ino=20708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.432000 audit[2452]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde90089e7 a2=241 a3=1b6 items=1 ppid=2406 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.432000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:06:32.432000 audit: PATH item=0 name="/dev/fd/63" inode=20085 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:32.432000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:32.477000 audit[2468]: AVC avc: denied { write } for pid=2468 comm="tee" name="fd" dev="proc" ino=20721 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.477000 audit[2468]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3b16b9f8 a2=241 a3=1b6 items=1 ppid=2414 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.477000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:06:32.477000 audit: PATH item=0 name="/dev/fd/63" inode=20091 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:32.477000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:32.486000 audit[2476]: AVC avc: denied { write } for pid=2476 comm="tee" name="fd" dev="proc" ino=20727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:32.486000 audit[2476]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff04e6c9f9 a2=241 a3=1b6 items=1 ppid=2420 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.486000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:06:32.486000 audit: PATH item=0 name="/dev/fd/63" inode=20092 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:32.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:32.750991 env[1220]: time="2024-12-13T02:06:32.750847900Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:32.755183 env[1220]: time="2024-12-13T02:06:32.755123071Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:32.759559 env[1220]: time="2024-12-13T02:06:32.756345080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:32.763625 env[1220]: time="2024-12-13T02:06:32.763578521Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:32.764265 env[1220]: time="2024-12-13T02:06:32.764220754Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:06:32.782748 kubelet[1569]: E1213 02:06:32.782075 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:32.802713 env[1220]: time="2024-12-13T02:06:32.801000328Z" level=info msg="CreateContainer within sandbox \"9e4ef7c09965a128d466a4609737af9face505b1008caf8a63b10db6e3a4e151\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:06:32.824562 env[1220]: time="2024-12-13T02:06:32.824489605Z" level=info msg="CreateContainer within sandbox \"9e4ef7c09965a128d466a4609737af9face505b1008caf8a63b10db6e3a4e151\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"32450cebcec733165c43af8eba386e73b0ec824b94bf0d0b1e5c4a1e45166353\"" Dec 13 02:06:32.825737 env[1220]: time="2024-12-13T02:06:32.825673498Z" level=info msg="StartContainer for \"32450cebcec733165c43af8eba386e73b0ec824b94bf0d0b1e5c4a1e45166353\"" Dec 13 02:06:32.887011 systemd[1]: Started cri-containerd-32450cebcec733165c43af8eba386e73b0ec824b94bf0d0b1e5c4a1e45166353.scope. Dec 13 02:06:32.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.920000 audit: BPF prog-id=85 op=LOAD Dec 13 02:06:32.920000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.920000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2171 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332343530636562636563373333313635633433616638656261333836 Dec 13 02:06:32.920000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.920000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2171 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332343530636562636563373333313635633433616638656261333836 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit: BPF prog-id=86 op=LOAD Dec 13 02:06:32.921000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002111e0 items=0 ppid=2171 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332343530636562636563373333313635633433616638656261333836 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit: BPF prog-id=87 op=LOAD Dec 13 02:06:32.921000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000211228 items=0 ppid=2171 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332343530636562636563373333313635633433616638656261333836 Dec 13 02:06:32.921000 audit: BPF prog-id=87 op=UNLOAD Dec 13 02:06:32.921000 audit: BPF prog-id=86 op=UNLOAD Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:32.921000 audit: BPF prog-id=88 op=LOAD Dec 13 02:06:32.921000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000211638 items=0 ppid=2171 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:32.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332343530636562636563373333313635633433616638656261333836 Dec 13 02:06:32.965185 env[1220]: time="2024-12-13T02:06:32.965089241Z" level=info msg="StartContainer for \"32450cebcec733165c43af8eba386e73b0ec824b94bf0d0b1e5c4a1e45166353\" returns successfully" Dec 13 02:06:33.783050 kubelet[1569]: E1213 02:06:33.782976 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:34.076323 kubelet[1569]: I1213 02:06:34.075873 1569 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7747f5cd6-66r4m" podStartSLOduration=2.092267144 podStartE2EDuration="8.075841119s" podCreationTimestamp="2024-12-13 02:06:26 +0000 UTC" firstStartedPulling="2024-12-13 02:06:26.783087731 +0000 UTC m=+17.664915818" lastFinishedPulling="2024-12-13 02:06:32.766661703 +0000 UTC m=+23.648489793" observedRunningTime="2024-12-13 02:06:33.072982244 +0000 UTC m=+23.954810344" watchObservedRunningTime="2024-12-13 02:06:34.075841119 +0000 UTC m=+24.957669240" Dec 13 02:06:34.097000 audit[2547]: NETFILTER_CFG table=filter:71 family=2 entries=9 op=nft_register_rule pid=2547 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:34.097000 audit[2547]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc3800d750 a2=0 a3=7ffc3800d73c items=0 ppid=1738 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:34.104000 audit[2547]: NETFILTER_CFG table=nat:72 family=2 entries=27 op=nft_register_chain pid=2547 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:34.104000 audit[2547]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc3800d750 a2=0 a3=7ffc3800d73c items=0 ppid=1738 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:34.784127 kubelet[1569]: E1213 02:06:34.784052 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:34.967393 env[1220]: time="2024-12-13T02:06:34.967322501Z" level=info msg="StopPodSandbox for \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\"" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.089 [INFO][2577] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.089 [INFO][2577] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" iface="eth0" netns="/var/run/netns/cni-020126df-7691-2316-b0d6-05677ffbc400" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.090 [INFO][2577] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" iface="eth0" netns="/var/run/netns/cni-020126df-7691-2316-b0d6-05677ffbc400" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.091 [INFO][2577] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" iface="eth0" netns="/var/run/netns/cni-020126df-7691-2316-b0d6-05677ffbc400" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.091 [INFO][2577] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.091 [INFO][2577] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.190 [INFO][2595] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" HandleID="k8s-pod-network.eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.190 [INFO][2595] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.190 [INFO][2595] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.200 [WARNING][2595] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" HandleID="k8s-pod-network.eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.200 [INFO][2595] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" HandleID="k8s-pod-network.eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.202 [INFO][2595] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:35.206813 env[1220]: 2024-12-13 02:06:35.205 [INFO][2577] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:06:35.210977 systemd[1]: run-netns-cni\x2d020126df\x2d7691\x2d2316\x2db0d6\x2d05677ffbc400.mount: Deactivated successfully. Dec 13 02:06:35.217390 env[1220]: time="2024-12-13T02:06:35.217315248Z" level=info msg="TearDown network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\" successfully" Dec 13 02:06:35.217390 env[1220]: time="2024-12-13T02:06:35.217392477Z" level=info msg="StopPodSandbox for \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\" returns successfully" Dec 13 02:06:35.218986 env[1220]: time="2024-12-13T02:06:35.218871993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9p8wk,Uid:13181872-b83c-4024-b2db-b96f8866cd4f,Namespace:calico-system,Attempt:1,}" Dec 13 02:06:35.304000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.304000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.304000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.304000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.304000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.304000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.304000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.304000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.304000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.304000 audit: BPF prog-id=89 op=LOAD Dec 13 02:06:35.304000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff387bea10 a2=98 a3=3 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.306000 audit: BPF prog-id=89 op=UNLOAD Dec 13 02:06:35.307000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.307000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.307000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.307000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.307000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.307000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.307000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.307000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.307000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.307000 audit: BPF prog-id=90 op=LOAD Dec 13 02:06:35.307000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff387be7f0 a2=74 a3=540051 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.308000 audit: BPF prog-id=90 op=UNLOAD Dec 13 02:06:35.308000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.308000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.308000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.308000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.308000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.308000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.308000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.308000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.308000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.308000 audit: BPF prog-id=91 op=LOAD Dec 13 02:06:35.308000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff387be820 a2=94 a3=2 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.309000 audit: BPF prog-id=91 op=UNLOAD Dec 13 02:06:35.487467 systemd-networkd[1029]: calic4d840d7771: Link UP Dec 13 02:06:35.495000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.495000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.495000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.495000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.495000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.495000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.495000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.495000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.502722 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:06:35.495000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.495000 audit: BPF prog-id=92 op=LOAD Dec 13 02:06:35.495000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff387be6e0 a2=40 a3=1 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.503000 audit: BPF prog-id=92 op=UNLOAD Dec 13 02:06:35.503000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.503000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff387be7b0 a2=50 a3=7fff387be890 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.511837 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic4d840d7771: link becomes ready Dec 13 02:06:35.503000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.517047 systemd-networkd[1029]: calic4d840d7771: Gained carrier Dec 13 02:06:35.519000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.519000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff387be6f0 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.519000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.519000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.519000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff387be720 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.519000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.520000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.520000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff387be630 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.520000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.520000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff387be740 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.520000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.520000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff387be720 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.521000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.521000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff387be710 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.521000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.521000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.521000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff387be740 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.521000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.524000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.524000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff387be720 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.524000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.524000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.524000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff387be740 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.524000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.524000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.524000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff387be710 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.524000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.524000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.524000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff387be780 a2=28 a3=0 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.524000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff387be530 a2=50 a3=1 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.525000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit: BPF prog-id=93 op=LOAD Dec 13 02:06:35.525000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff387be530 a2=94 a3=5 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.525000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.525000 audit: BPF prog-id=93 op=UNLOAD Dec 13 02:06:35.525000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.525000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff387be5e0 a2=50 a3=1 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.525000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff387be700 a2=4 a3=38 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.526000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { confidentiality } for pid=2620 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:35.526000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff387be750 a2=94 a3=6 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.526000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.526000 audit[2620]: AVC avc: denied { confidentiality } for pid=2620 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:35.526000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff387bdf00 a2=94 a3=83 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.526000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.528000 audit[2620]: AVC avc: denied { confidentiality } for pid=2620 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:35.528000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff387bdf00 a2=94 a3=83 items=0 ppid=2572 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.528000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.322 [INFO][2602] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.29-k8s-csi--node--driver--9p8wk-eth0 csi-node-driver- calico-system 13181872-b83c-4024-b2db-b96f8866cd4f 1180 0 2024-12-13 02:06:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.29 csi-node-driver-9p8wk eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic4d840d7771 [] []}} ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Namespace="calico-system" Pod="csi-node-driver-9p8wk" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--9p8wk-" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.322 [INFO][2602] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Namespace="calico-system" Pod="csi-node-driver-9p8wk" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.394 [INFO][2622] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" HandleID="k8s-pod-network.48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.408 [INFO][2622] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" HandleID="k8s-pod-network.48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000423d40), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.29", "pod":"csi-node-driver-9p8wk", "timestamp":"2024-12-13 02:06:35.394572871 +0000 UTC"}, Hostname:"10.128.0.29", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.408 [INFO][2622] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.408 [INFO][2622] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.408 [INFO][2622] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.29' Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.410 [INFO][2622] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" host="10.128.0.29" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.416 [INFO][2622] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.29" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.430 [INFO][2622] ipam/ipam.go 489: Trying affinity for 192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.432 [INFO][2622] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.435 [INFO][2622] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.435 [INFO][2622] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" host="10.128.0.29" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.437 [INFO][2622] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13 Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.442 [INFO][2622] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" host="10.128.0.29" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.460 [INFO][2622] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.129/26] block=192.168.125.128/26 handle="k8s-pod-network.48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" host="10.128.0.29" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.460 [INFO][2622] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.129/26] handle="k8s-pod-network.48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" host="10.128.0.29" Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.460 [INFO][2622] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:35.537915 env[1220]: 2024-12-13 02:06:35.460 [INFO][2622] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.129/26] IPv6=[] ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" HandleID="k8s-pod-network.48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.541068 env[1220]: 2024-12-13 02:06:35.463 [INFO][2602] cni-plugin/k8s.go 386: Populated endpoint ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Namespace="calico-system" Pod="csi-node-driver-9p8wk" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-csi--node--driver--9p8wk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"13181872-b83c-4024-b2db-b96f8866cd4f", ResourceVersion:"1180", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"", Pod:"csi-node-driver-9p8wk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic4d840d7771", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:35.541068 env[1220]: 2024-12-13 02:06:35.463 [INFO][2602] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.129/32] ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Namespace="calico-system" Pod="csi-node-driver-9p8wk" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.541068 env[1220]: 2024-12-13 02:06:35.463 [INFO][2602] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic4d840d7771 ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Namespace="calico-system" Pod="csi-node-driver-9p8wk" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.541068 env[1220]: 2024-12-13 02:06:35.518 [INFO][2602] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Namespace="calico-system" Pod="csi-node-driver-9p8wk" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.541068 env[1220]: 2024-12-13 02:06:35.519 [INFO][2602] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Namespace="calico-system" Pod="csi-node-driver-9p8wk" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-csi--node--driver--9p8wk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"13181872-b83c-4024-b2db-b96f8866cd4f", ResourceVersion:"1180", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13", Pod:"csi-node-driver-9p8wk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic4d840d7771", MAC:"96:1e:a3:ee:66:97", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:35.541068 env[1220]: 2024-12-13 02:06:35.530 [INFO][2602] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13" Namespace="calico-system" Pod="csi-node-driver-9p8wk" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit: BPF prog-id=94 op=LOAD Dec 13 02:06:35.547000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff925481c0 a2=98 a3=1999999999999999 items=0 ppid=2572 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.547000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:35.547000 audit: BPF prog-id=94 op=UNLOAD Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.547000 audit: BPF prog-id=95 op=LOAD Dec 13 02:06:35.547000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff925480a0 a2=74 a3=ffff items=0 ppid=2572 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.547000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:35.548000 audit: BPF prog-id=95 op=UNLOAD Dec 13 02:06:35.548000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.548000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.548000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.548000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.548000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.548000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.548000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.548000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.548000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.548000 audit: BPF prog-id=96 op=LOAD Dec 13 02:06:35.548000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff925480e0 a2=40 a3=7fff925482c0 items=0 ppid=2572 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.548000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:35.548000 audit: BPF prog-id=96 op=UNLOAD Dec 13 02:06:35.574026 env[1220]: time="2024-12-13T02:06:35.573908600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:35.574026 env[1220]: time="2024-12-13T02:06:35.573980183Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:35.574026 env[1220]: time="2024-12-13T02:06:35.573999195Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:35.581008 env[1220]: time="2024-12-13T02:06:35.574661910Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13 pid=2664 runtime=io.containerd.runc.v2 Dec 13 02:06:35.617651 systemd[1]: Started cri-containerd-48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13.scope. Dec 13 02:06:35.622824 systemd[1]: run-containerd-runc-k8s.io-48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13-runc.PHdbtd.mount: Deactivated successfully. Dec 13 02:06:35.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.648000 audit: BPF prog-id=97 op=LOAD Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626335373364643861346166343466393836633864353133326631 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626335373364643861346166343466393836633864353133326631 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit: BPF prog-id=98 op=LOAD Dec 13 02:06:35.649000 audit[2674]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a92a0 items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626335373364643861346166343466393836633864353133326631 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit: BPF prog-id=99 op=LOAD Dec 13 02:06:35.649000 audit[2674]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a92e8 items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626335373364643861346166343466393836633864353133326631 Dec 13 02:06:35.649000 audit: BPF prog-id=99 op=UNLOAD Dec 13 02:06:35.649000 audit: BPF prog-id=98 op=UNLOAD Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.649000 audit: BPF prog-id=100 op=LOAD Dec 13 02:06:35.649000 audit[2674]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a96f8 items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626335373364643861346166343466393836633864353133326631 Dec 13 02:06:35.668643 env[1220]: time="2024-12-13T02:06:35.668585823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9p8wk,Uid:13181872-b83c-4024-b2db-b96f8866cd4f,Namespace:calico-system,Attempt:1,} returns sandbox id \"48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13\"" Dec 13 02:06:35.672139 env[1220]: time="2024-12-13T02:06:35.672098702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:06:35.785337 kubelet[1569]: E1213 02:06:35.785157 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:36.259388 env[1220]: time="2024-12-13T02:06:36.259290535Z" level=info msg="Kill container \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\"" Dec 13 02:06:36.278562 systemd[1]: cri-containerd-f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188.scope: Deactivated successfully. Dec 13 02:06:36.278976 systemd[1]: cri-containerd-f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188.scope: Consumed 1.898s CPU time. Dec 13 02:06:36.282000 audit: BPF prog-id=84 op=UNLOAD Dec 13 02:06:36.315059 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188-rootfs.mount: Deactivated successfully. Dec 13 02:06:36.785766 kubelet[1569]: E1213 02:06:36.785693 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:37.045368 systemd-networkd[1029]: calic4d840d7771: Gained IPv6LL Dec 13 02:06:37.786960 kubelet[1569]: E1213 02:06:37.786885 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:38.024411 env[1220]: time="2024-12-13T02:06:38.023195615Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:38.162061 env[1220]: time="2024-12-13T02:06:38.161996709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:38.164934 env[1220]: time="2024-12-13T02:06:38.164879455Z" level=info msg="shim disconnected" id=f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188 Dec 13 02:06:38.165170 env[1220]: time="2024-12-13T02:06:38.165141223Z" level=warning msg="cleaning up after shim disconnected" id=f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188 namespace=k8s.io Dec 13 02:06:38.165299 env[1220]: time="2024-12-13T02:06:38.165275496Z" level=info msg="cleaning up dead shim" Dec 13 02:06:38.165841 env[1220]: time="2024-12-13T02:06:38.165185729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:38.167864 env[1220]: time="2024-12-13T02:06:38.167824331Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:38.169039 env[1220]: time="2024-12-13T02:06:38.168991309Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:06:38.172792 env[1220]: time="2024-12-13T02:06:38.172744993Z" level=info msg="CreateContainer within sandbox \"48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:06:38.188272 env[1220]: time="2024-12-13T02:06:38.188199202Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2733 runtime=io.containerd.runc.v2\n" Dec 13 02:06:38.191064 env[1220]: time="2024-12-13T02:06:38.191005251Z" level=info msg="StopContainer for \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\" returns successfully" Dec 13 02:06:38.206993 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount230039646.mount: Deactivated successfully. Dec 13 02:06:38.209432 env[1220]: time="2024-12-13T02:06:38.209389202Z" level=info msg="StopPodSandbox for \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\"" Dec 13 02:06:38.209659 env[1220]: time="2024-12-13T02:06:38.209631679Z" level=info msg="Container to stop \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:06:38.209816 env[1220]: time="2024-12-13T02:06:38.209789050Z" level=info msg="Container to stop \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:06:38.209925 env[1220]: time="2024-12-13T02:06:38.209901613Z" level=info msg="Container to stop \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:06:38.217706 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e-shm.mount: Deactivated successfully. Dec 13 02:06:38.223058 env[1220]: time="2024-12-13T02:06:38.222997947Z" level=info msg="CreateContainer within sandbox \"48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e73088cc52120c11f007f1cbca8fe066ddc90fc6834bdf6b2616dae3172bf300\"" Dec 13 02:06:38.224250 env[1220]: time="2024-12-13T02:06:38.224207680Z" level=info msg="StartContainer for \"e73088cc52120c11f007f1cbca8fe066ddc90fc6834bdf6b2616dae3172bf300\"" Dec 13 02:06:38.225000 audit: BPF prog-id=65 op=UNLOAD Dec 13 02:06:38.226290 systemd[1]: cri-containerd-a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e.scope: Deactivated successfully. Dec 13 02:06:38.239457 kernel: kauditd_printk_skb: 334 callbacks suppressed Dec 13 02:06:38.239610 kernel: audit: type=1334 audit(1734055598.225:655): prog-id=65 op=UNLOAD Dec 13 02:06:38.240000 audit: BPF prog-id=68 op=UNLOAD Dec 13 02:06:38.250710 kernel: audit: type=1334 audit(1734055598.240:656): prog-id=68 op=UNLOAD Dec 13 02:06:38.287863 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e-rootfs.mount: Deactivated successfully. Dec 13 02:06:38.297018 systemd[1]: Started cri-containerd-e73088cc52120c11f007f1cbca8fe066ddc90fc6834bdf6b2616dae3172bf300.scope. Dec 13 02:06:38.307745 env[1220]: time="2024-12-13T02:06:38.306960067Z" level=info msg="shim disconnected" id=a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e Dec 13 02:06:38.307745 env[1220]: time="2024-12-13T02:06:38.307103833Z" level=warning msg="cleaning up after shim disconnected" id=a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e namespace=k8s.io Dec 13 02:06:38.307745 env[1220]: time="2024-12-13T02:06:38.307123507Z" level=info msg="cleaning up dead shim" Dec 13 02:06:38.325725 env[1220]: time="2024-12-13T02:06:38.325131210Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2786 runtime=io.containerd.runc.v2\n" Dec 13 02:06:38.325725 env[1220]: time="2024-12-13T02:06:38.325584275Z" level=info msg="TearDown network for sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" successfully" Dec 13 02:06:38.325725 env[1220]: time="2024-12-13T02:06:38.325622239Z" level=info msg="StopPodSandbox for \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" returns successfully" Dec 13 02:06:38.332000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.387983 kernel: audit: type=1400 audit(1734055598.332:657): avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.388164 kernel: audit: type=1300 audit(1734055598.332:657): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f50f94eb568 items=0 ppid=2664 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.332000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f50f94eb568 items=0 ppid=2664 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.388497 kubelet[1569]: I1213 02:06:38.387589 1569 topology_manager.go:215] "Topology Admit Handler" podUID="6fea07eb-d57c-42f8-b9df-3acc20f850a4" podNamespace="calico-system" podName="calico-node-pwd9n" Dec 13 02:06:38.388497 kubelet[1569]: E1213 02:06:38.387711 1569 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="94b816d2-bd05-4afb-8a4e-230ce84a964d" containerName="flexvol-driver" Dec 13 02:06:38.388497 kubelet[1569]: E1213 02:06:38.387727 1569 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="94b816d2-bd05-4afb-8a4e-230ce84a964d" containerName="install-cni" Dec 13 02:06:38.388497 kubelet[1569]: E1213 02:06:38.387738 1569 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="94b816d2-bd05-4afb-8a4e-230ce84a964d" containerName="calico-node" Dec 13 02:06:38.388497 kubelet[1569]: I1213 02:06:38.387774 1569 memory_manager.go:354] "RemoveStaleState removing state" podUID="94b816d2-bd05-4afb-8a4e-230ce84a964d" containerName="calico-node" Dec 13 02:06:38.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537333038386363353231323063313166303037663163626361386665 Dec 13 02:06:38.401270 systemd[1]: Created slice kubepods-besteffort-pod6fea07eb_d57c_42f8_b9df_3acc20f850a4.slice. Dec 13 02:06:38.427782 kernel: audit: type=1327 audit(1734055598.332:657): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537333038386363353231323063313166303037663163626361386665 Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.451769 kernel: audit: type=1400 audit(1734055598.344:658): avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.455307 env[1220]: time="2024-12-13T02:06:38.455144702Z" level=info msg="StartContainer for \"e73088cc52120c11f007f1cbca8fe066ddc90fc6834bdf6b2616dae3172bf300\" returns successfully" Dec 13 02:06:38.457938 env[1220]: time="2024-12-13T02:06:38.457891802Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.483771 kernel: audit: type=1400 audit(1734055598.344:658): avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.483952 kernel: audit: type=1400 audit(1734055598.344:658): avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.488733 kubelet[1569]: I1213 02:06:38.487181 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-var-lib-calico\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.488733 kubelet[1569]: I1213 02:06:38.487268 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-bin-dir\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.488733 kubelet[1569]: I1213 02:06:38.487295 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-xtables-lock\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.488733 kubelet[1569]: I1213 02:06:38.487321 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-log-dir\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.488733 kubelet[1569]: I1213 02:06:38.487347 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-policysync\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.488733 kubelet[1569]: I1213 02:06:38.487384 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-k9788\" (UniqueName: \"kubernetes.io/projected/94b816d2-bd05-4afb-8a4e-230ce84a964d-kube-api-access-k9788\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.489202 kubelet[1569]: I1213 02:06:38.487418 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-lib-modules\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.489202 kubelet[1569]: I1213 02:06:38.487461 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-flexvol-driver-host\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.489202 kubelet[1569]: I1213 02:06:38.487495 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/94b816d2-bd05-4afb-8a4e-230ce84a964d-node-certs\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.489202 kubelet[1569]: I1213 02:06:38.487521 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-var-run-calico\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.489202 kubelet[1569]: I1213 02:06:38.487559 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/94b816d2-bd05-4afb-8a4e-230ce84a964d-tigera-ca-bundle\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.489202 kubelet[1569]: I1213 02:06:38.487585 1569 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-net-dir\") pod \"94b816d2-bd05-4afb-8a4e-230ce84a964d\" (UID: \"94b816d2-bd05-4afb-8a4e-230ce84a964d\") " Dec 13 02:06:38.489558 kubelet[1569]: I1213 02:06:38.487650 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6fea07eb-d57c-42f8-b9df-3acc20f850a4-node-certs\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.489558 kubelet[1569]: I1213 02:06:38.487711 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5sdb5\" (UniqueName: \"kubernetes.io/projected/6fea07eb-d57c-42f8-b9df-3acc20f850a4-kube-api-access-5sdb5\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.489558 kubelet[1569]: I1213 02:06:38.487744 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6fea07eb-d57c-42f8-b9df-3acc20f850a4-lib-modules\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.489558 kubelet[1569]: I1213 02:06:38.487772 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6fea07eb-d57c-42f8-b9df-3acc20f850a4-cni-net-dir\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.489558 kubelet[1569]: I1213 02:06:38.487800 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6fea07eb-d57c-42f8-b9df-3acc20f850a4-xtables-lock\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.489845 kubelet[1569]: I1213 02:06:38.487860 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6fea07eb-d57c-42f8-b9df-3acc20f850a4-var-lib-calico\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.489845 kubelet[1569]: I1213 02:06:38.487898 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6fea07eb-d57c-42f8-b9df-3acc20f850a4-tigera-ca-bundle\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.489845 kubelet[1569]: I1213 02:06:38.487929 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6fea07eb-d57c-42f8-b9df-3acc20f850a4-cni-bin-dir\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.489845 kubelet[1569]: I1213 02:06:38.487965 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6fea07eb-d57c-42f8-b9df-3acc20f850a4-policysync\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.489845 kubelet[1569]: I1213 02:06:38.487995 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6fea07eb-d57c-42f8-b9df-3acc20f850a4-flexvol-driver-host\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.490107 kubelet[1569]: I1213 02:06:38.488027 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6fea07eb-d57c-42f8-b9df-3acc20f850a4-var-run-calico\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.490107 kubelet[1569]: I1213 02:06:38.488061 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6fea07eb-d57c-42f8-b9df-3acc20f850a4-cni-log-dir\") pod \"calico-node-pwd9n\" (UID: \"6fea07eb-d57c-42f8-b9df-3acc20f850a4\") " pod="calico-system/calico-node-pwd9n" Dec 13 02:06:38.490107 kubelet[1569]: I1213 02:06:38.488154 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:06:38.490107 kubelet[1569]: I1213 02:06:38.488205 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:06:38.490107 kubelet[1569]: I1213 02:06:38.488230 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:06:38.490369 kubelet[1569]: I1213 02:06:38.488254 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:06:38.490369 kubelet[1569]: I1213 02:06:38.488280 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-policysync" (OuterVolumeSpecName: "policysync") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:06:38.500053 kubelet[1569]: I1213 02:06:38.500002 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:06:38.500396 kubelet[1569]: I1213 02:06:38.500359 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:06:38.500561 kubelet[1569]: I1213 02:06:38.500540 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:06:38.502915 kubelet[1569]: I1213 02:06:38.502870 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.503919 kubelet[1569]: I1213 02:06:38.503881 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/94b816d2-bd05-4afb-8a4e-230ce84a964d-kube-api-access-k9788" (OuterVolumeSpecName: "kube-api-access-k9788") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "kube-api-access-k9788". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 02:06:38.523859 kernel: audit: type=1400 audit(1734055598.344:658): avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.524049 kernel: audit: type=1400 audit(1734055598.344:658): avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.525082 kubelet[1569]: I1213 02:06:38.525033 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/94b816d2-bd05-4afb-8a4e-230ce84a964d-node-certs" (OuterVolumeSpecName: "node-certs") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.344000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.344000 audit: BPF prog-id=101 op=LOAD Dec 13 02:06:38.344000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002168c8 items=0 ppid=2664 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537333038386363353231323063313166303037663163626361386665 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit: BPF prog-id=102 op=LOAD Dec 13 02:06:38.386000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000216918 items=0 ppid=2664 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537333038386363353231323063313166303037663163626361386665 Dec 13 02:06:38.386000 audit: BPF prog-id=102 op=UNLOAD Dec 13 02:06:38.386000 audit: BPF prog-id=101 op=UNLOAD Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.386000 audit: BPF prog-id=103 op=LOAD Dec 13 02:06:38.386000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002169a8 items=0 ppid=2664 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537333038386363353231323063313166303037663163626361386665 Dec 13 02:06:38.547091 kubelet[1569]: I1213 02:06:38.546138 1569 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/94b816d2-bd05-4afb-8a4e-230ce84a964d-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "94b816d2-bd05-4afb-8a4e-230ce84a964d" (UID: "94b816d2-bd05-4afb-8a4e-230ce84a964d"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 02:06:38.588946 kubelet[1569]: I1213 02:06:38.588881 1569 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-policysync\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.589282 kubelet[1569]: I1213 02:06:38.589237 1569 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-k9788\" (UniqueName: \"kubernetes.io/projected/94b816d2-bd05-4afb-8a4e-230ce84a964d-kube-api-access-k9788\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.589463 kubelet[1569]: I1213 02:06:38.589421 1569 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-lib-modules\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.589596 kubelet[1569]: I1213 02:06:38.589580 1569 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-flexvol-driver-host\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.589812 kubelet[1569]: I1213 02:06:38.589767 1569 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/94b816d2-bd05-4afb-8a4e-230ce84a964d-node-certs\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.589989 kubelet[1569]: I1213 02:06:38.589945 1569 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-var-run-calico\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.590146 kubelet[1569]: I1213 02:06:38.590108 1569 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/94b816d2-bd05-4afb-8a4e-230ce84a964d-tigera-ca-bundle\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.590293 kubelet[1569]: I1213 02:06:38.590275 1569 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-net-dir\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.590447 kubelet[1569]: I1213 02:06:38.590428 1569 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-var-lib-calico\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.590558 kubelet[1569]: I1213 02:06:38.590543 1569 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-bin-dir\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.590699 kubelet[1569]: I1213 02:06:38.590659 1569 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-xtables-lock\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.590830 kubelet[1569]: I1213 02:06:38.590811 1569 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/94b816d2-bd05-4afb-8a4e-230ce84a964d-cni-log-dir\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 02:06:38.711596 env[1220]: time="2024-12-13T02:06:38.707385656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pwd9n,Uid:6fea07eb-d57c-42f8-b9df-3acc20f850a4,Namespace:calico-system,Attempt:0,}" Dec 13 02:06:38.729912 env[1220]: time="2024-12-13T02:06:38.729816732Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:38.730135 env[1220]: time="2024-12-13T02:06:38.729938609Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:38.730135 env[1220]: time="2024-12-13T02:06:38.729982114Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:38.730278 env[1220]: time="2024-12-13T02:06:38.730231608Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6020f811fc13f5978916aaf7490c7a38c107a1cfb6b0ba6b410bd1b893a98341 pid=2822 runtime=io.containerd.runc.v2 Dec 13 02:06:38.749112 systemd[1]: Started cri-containerd-6020f811fc13f5978916aaf7490c7a38c107a1cfb6b0ba6b410bd1b893a98341.scope. Dec 13 02:06:38.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit: BPF prog-id=104 op=LOAD Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323066383131666331336635393738393136616166373439306337 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323066383131666331336635393738393136616166373439306337 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.771000 audit: BPF prog-id=105 op=LOAD Dec 13 02:06:38.771000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00032fd00 items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323066383131666331336635393738393136616166373439306337 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit: BPF prog-id=106 op=LOAD Dec 13 02:06:38.772000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00032fd48 items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323066383131666331336635393738393136616166373439306337 Dec 13 02:06:38.772000 audit: BPF prog-id=106 op=UNLOAD Dec 13 02:06:38.772000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.772000 audit: BPF prog-id=107 op=LOAD Dec 13 02:06:38.772000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00038e158 items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323066383131666331336635393738393136616166373439306337 Dec 13 02:06:38.787463 kubelet[1569]: E1213 02:06:38.787418 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:38.798081 env[1220]: time="2024-12-13T02:06:38.798020740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pwd9n,Uid:6fea07eb-d57c-42f8-b9df-3acc20f850a4,Namespace:calico-system,Attempt:0,} returns sandbox id \"6020f811fc13f5978916aaf7490c7a38c107a1cfb6b0ba6b410bd1b893a98341\"" Dec 13 02:06:38.802304 env[1220]: time="2024-12-13T02:06:38.802237290Z" level=info msg="CreateContainer within sandbox \"6020f811fc13f5978916aaf7490c7a38c107a1cfb6b0ba6b410bd1b893a98341\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:06:38.822370 env[1220]: time="2024-12-13T02:06:38.822305678Z" level=info msg="CreateContainer within sandbox \"6020f811fc13f5978916aaf7490c7a38c107a1cfb6b0ba6b410bd1b893a98341\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f68ed547dcf08cc3fdbeed7c48ee02d745579f744592e8dd87f5800adab20eaf\"" Dec 13 02:06:38.823864 env[1220]: time="2024-12-13T02:06:38.823807414Z" level=info msg="StartContainer for \"f68ed547dcf08cc3fdbeed7c48ee02d745579f744592e8dd87f5800adab20eaf\"" Dec 13 02:06:38.847486 systemd[1]: Started cri-containerd-f68ed547dcf08cc3fdbeed7c48ee02d745579f744592e8dd87f5800adab20eaf.scope. Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7a4c6df718 items=0 ppid=2822 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636386564353437646366303863633366646265656437633438656530 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.872000 audit: BPF prog-id=108 op=LOAD Dec 13 02:06:38.872000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000227af8 items=0 ppid=2822 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636386564353437646366303863633366646265656437633438656530 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit: BPF prog-id=109 op=LOAD Dec 13 02:06:38.873000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000227b48 items=0 ppid=2822 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636386564353437646366303863633366646265656437633438656530 Dec 13 02:06:38.873000 audit: BPF prog-id=109 op=UNLOAD Dec 13 02:06:38.873000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:38.873000 audit: BPF prog-id=110 op=LOAD Dec 13 02:06:38.873000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000227bd8 items=0 ppid=2822 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:38.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636386564353437646366303863633366646265656437633438656530 Dec 13 02:06:38.894480 env[1220]: time="2024-12-13T02:06:38.893027858Z" level=info msg="StartContainer for \"f68ed547dcf08cc3fdbeed7c48ee02d745579f744592e8dd87f5800adab20eaf\" returns successfully" Dec 13 02:06:38.913539 systemd[1]: cri-containerd-f68ed547dcf08cc3fdbeed7c48ee02d745579f744592e8dd87f5800adab20eaf.scope: Deactivated successfully. Dec 13 02:06:38.916000 audit: BPF prog-id=110 op=UNLOAD Dec 13 02:06:38.953554 env[1220]: time="2024-12-13T02:06:38.953475402Z" level=info msg="shim disconnected" id=f68ed547dcf08cc3fdbeed7c48ee02d745579f744592e8dd87f5800adab20eaf Dec 13 02:06:38.953554 env[1220]: time="2024-12-13T02:06:38.953538707Z" level=warning msg="cleaning up after shim disconnected" id=f68ed547dcf08cc3fdbeed7c48ee02d745579f744592e8dd87f5800adab20eaf namespace=k8s.io Dec 13 02:06:38.953554 env[1220]: time="2024-12-13T02:06:38.953556648Z" level=info msg="cleaning up dead shim" Dec 13 02:06:38.966115 env[1220]: time="2024-12-13T02:06:38.965958582Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2903 runtime=io.containerd.runc.v2\n" Dec 13 02:06:38.971857 env[1220]: time="2024-12-13T02:06:38.971799255Z" level=info msg="StopPodSandbox for \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\"" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.029 [INFO][2930] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.029 [INFO][2930] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" iface="eth0" netns="/var/run/netns/cni-8a86215c-2ddd-73c8-1093-23cb7405affc" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.030 [INFO][2930] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" iface="eth0" netns="/var/run/netns/cni-8a86215c-2ddd-73c8-1093-23cb7405affc" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.030 [INFO][2930] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" iface="eth0" netns="/var/run/netns/cni-8a86215c-2ddd-73c8-1093-23cb7405affc" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.030 [INFO][2930] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.030 [INFO][2930] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.065 [INFO][2941] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" HandleID="k8s-pod-network.2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.065 [INFO][2941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.065 [INFO][2941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.073 [WARNING][2941] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" HandleID="k8s-pod-network.2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.073 [INFO][2941] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" HandleID="k8s-pod-network.2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.075 [INFO][2941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:39.078791 env[1220]: 2024-12-13 02:06:39.077 [INFO][2930] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:06:39.080443 env[1220]: time="2024-12-13T02:06:39.080389282Z" level=info msg="TearDown network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\" successfully" Dec 13 02:06:39.080635 env[1220]: time="2024-12-13T02:06:39.080603910Z" level=info msg="StopPodSandbox for \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\" returns successfully" Dec 13 02:06:39.081469 env[1220]: time="2024-12-13T02:06:39.081436903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-kp89t,Uid:bd2ec361-43e4-4217-a0ff-5fd487160d13,Namespace:default,Attempt:1,}" Dec 13 02:06:39.087370 env[1220]: time="2024-12-13T02:06:39.087310846Z" level=info msg="CreateContainer within sandbox \"6020f811fc13f5978916aaf7490c7a38c107a1cfb6b0ba6b410bd1b893a98341\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:06:39.092573 kubelet[1569]: I1213 02:06:39.092106 1569 scope.go:117] "RemoveContainer" containerID="f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188" Dec 13 02:06:39.100504 systemd[1]: Removed slice kubepods-besteffort-pod94b816d2_bd05_4afb_8a4e_230ce84a964d.slice. Dec 13 02:06:39.100673 systemd[1]: kubepods-besteffort-pod94b816d2_bd05_4afb_8a4e_230ce84a964d.slice: Consumed 2.589s CPU time. Dec 13 02:06:39.104622 env[1220]: time="2024-12-13T02:06:39.104573684Z" level=info msg="RemoveContainer for \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\"" Dec 13 02:06:39.113022 env[1220]: time="2024-12-13T02:06:39.112969085Z" level=info msg="RemoveContainer for \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\" returns successfully" Dec 13 02:06:39.113831 kubelet[1569]: I1213 02:06:39.113619 1569 scope.go:117] "RemoveContainer" containerID="c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0" Dec 13 02:06:39.116419 env[1220]: time="2024-12-13T02:06:39.116372213Z" level=info msg="RemoveContainer for \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\"" Dec 13 02:06:39.124858 env[1220]: time="2024-12-13T02:06:39.124784630Z" level=info msg="RemoveContainer for \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\" returns successfully" Dec 13 02:06:39.125726 kubelet[1569]: I1213 02:06:39.125509 1569 scope.go:117] "RemoveContainer" containerID="b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015" Dec 13 02:06:39.128867 env[1220]: time="2024-12-13T02:06:39.128751206Z" level=info msg="RemoveContainer for \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\"" Dec 13 02:06:39.129600 env[1220]: time="2024-12-13T02:06:39.129548482Z" level=info msg="CreateContainer within sandbox \"6020f811fc13f5978916aaf7490c7a38c107a1cfb6b0ba6b410bd1b893a98341\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c2475c634f895f247df1562639bd0deb4da64d76fd0a35240e416afe039fca5c\"" Dec 13 02:06:39.130621 env[1220]: time="2024-12-13T02:06:39.130584141Z" level=info msg="StartContainer for \"c2475c634f895f247df1562639bd0deb4da64d76fd0a35240e416afe039fca5c\"" Dec 13 02:06:39.146320 env[1220]: time="2024-12-13T02:06:39.146225679Z" level=info msg="RemoveContainer for \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\" returns successfully" Dec 13 02:06:39.150590 kubelet[1569]: I1213 02:06:39.150552 1569 scope.go:117] "RemoveContainer" containerID="f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188" Dec 13 02:06:39.169657 env[1220]: time="2024-12-13T02:06:39.167828980Z" level=error msg="ContainerStatus for \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\": not found" Dec 13 02:06:39.169880 kubelet[1569]: E1213 02:06:39.169779 1569 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\": not found" containerID="f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188" Dec 13 02:06:39.169880 kubelet[1569]: I1213 02:06:39.169827 1569 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188"} err="failed to get container status \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\": rpc error: code = NotFound desc = an error occurred when try to find container \"f0926b6cd1821dfdb5968a743e963b95e53aa7a3133d0932fc9304a1b81ab188\": not found" Dec 13 02:06:39.169880 kubelet[1569]: I1213 02:06:39.169872 1569 scope.go:117] "RemoveContainer" containerID="c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0" Dec 13 02:06:39.171983 env[1220]: time="2024-12-13T02:06:39.171893356Z" level=error msg="ContainerStatus for \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\": not found" Dec 13 02:06:39.172495 kubelet[1569]: E1213 02:06:39.172459 1569 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\": not found" containerID="c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0" Dec 13 02:06:39.172624 kubelet[1569]: I1213 02:06:39.172505 1569 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0"} err="failed to get container status \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\": rpc error: code = NotFound desc = an error occurred when try to find container \"c1586f8d6d4cbc6a9ab0b299a72011a60015db8a0e1a35d722915315dff3b0a0\": not found" Dec 13 02:06:39.172624 kubelet[1569]: I1213 02:06:39.172538 1569 scope.go:117] "RemoveContainer" containerID="b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015" Dec 13 02:06:39.173115 env[1220]: time="2024-12-13T02:06:39.173037702Z" level=error msg="ContainerStatus for \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\": not found" Dec 13 02:06:39.173267 kubelet[1569]: E1213 02:06:39.173238 1569 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\": not found" containerID="b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015" Dec 13 02:06:39.173365 kubelet[1569]: I1213 02:06:39.173278 1569 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015"} err="failed to get container status \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\": rpc error: code = NotFound desc = an error occurred when try to find container \"b591ae2e6735b5765df3581011ea17c0e45e4c42b1ca2de6c04fb81c42918015\": not found" Dec 13 02:06:39.212557 systemd[1]: var-lib-kubelet-pods-94b816d2\x2dbd05\x2d4afb\x2d8a4e\x2d230ce84a964d-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 02:06:39.213216 systemd[1]: run-netns-cni\x2d8a86215c\x2d2ddd\x2d73c8\x2d1093\x2d23cb7405affc.mount: Deactivated successfully. Dec 13 02:06:39.213511 systemd[1]: var-lib-kubelet-pods-94b816d2\x2dbd05\x2d4afb\x2d8a4e\x2d230ce84a964d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dk9788.mount: Deactivated successfully. Dec 13 02:06:39.213812 systemd[1]: var-lib-kubelet-pods-94b816d2\x2dbd05\x2d4afb\x2d8a4e\x2d230ce84a964d-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 02:06:39.233261 systemd[1]: Started cri-containerd-c2475c634f895f247df1562639bd0deb4da64d76fd0a35240e416afe039fca5c.scope. Dec 13 02:06:39.249967 systemd[1]: run-containerd-runc-k8s.io-c2475c634f895f247df1562639bd0deb4da64d76fd0a35240e416afe039fca5c-runc.RJVMoi.mount: Deactivated successfully. Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8214459a78 items=0 ppid=2822 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:39.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332343735633633346638393566323437646631353632363339626430 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit: BPF prog-id=111 op=LOAD Dec 13 02:06:39.281000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003b2528 items=0 ppid=2822 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:39.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332343735633633346638393566323437646631353632363339626430 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit: BPF prog-id=112 op=LOAD Dec 13 02:06:39.281000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003b2578 items=0 ppid=2822 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:39.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332343735633633346638393566323437646631353632363339626430 Dec 13 02:06:39.281000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:06:39.281000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.281000 audit: BPF prog-id=113 op=LOAD Dec 13 02:06:39.281000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003b2608 items=0 ppid=2822 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:39.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332343735633633346638393566323437646631353632363339626430 Dec 13 02:06:39.361787 env[1220]: time="2024-12-13T02:06:39.361652985Z" level=info msg="StartContainer for \"c2475c634f895f247df1562639bd0deb4da64d76fd0a35240e416afe039fca5c\" returns successfully" Dec 13 02:06:39.440436 systemd-networkd[1029]: calib1e278e5955: Link UP Dec 13 02:06:39.454911 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:06:39.455100 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib1e278e5955: link becomes ready Dec 13 02:06:39.461935 systemd-networkd[1029]: calib1e278e5955: Gained carrier Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.192 [INFO][2949] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0 nginx-deployment-85f456d6dd- default bd2ec361-43e4-4217-a0ff-5fd487160d13 1206 0 2024-12-13 02:06:23 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.29 nginx-deployment-85f456d6dd-kp89t eth0 default [] [] [kns.default ksa.default.default] calib1e278e5955 [] []}} ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Namespace="default" Pod="nginx-deployment-85f456d6dd-kp89t" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.192 [INFO][2949] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Namespace="default" Pod="nginx-deployment-85f456d6dd-kp89t" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.353 [INFO][2977] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" HandleID="k8s-pod-network.803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.368 [INFO][2977] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" HandleID="k8s-pod-network.803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318b20), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.29", "pod":"nginx-deployment-85f456d6dd-kp89t", "timestamp":"2024-12-13 02:06:39.353397675 +0000 UTC"}, Hostname:"10.128.0.29", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.368 [INFO][2977] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.369 [INFO][2977] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.369 [INFO][2977] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.29' Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.375 [INFO][2977] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" host="10.128.0.29" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.395 [INFO][2977] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.29" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.403 [INFO][2977] ipam/ipam.go 489: Trying affinity for 192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.406 [INFO][2977] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.412 [INFO][2977] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.412 [INFO][2977] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" host="10.128.0.29" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.414 [INFO][2977] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837 Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.421 [INFO][2977] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" host="10.128.0.29" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.434 [INFO][2977] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.130/26] block=192.168.125.128/26 handle="k8s-pod-network.803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" host="10.128.0.29" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.434 [INFO][2977] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.130/26] handle="k8s-pod-network.803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" host="10.128.0.29" Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.434 [INFO][2977] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:39.476928 env[1220]: 2024-12-13 02:06:39.434 [INFO][2977] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.130/26] IPv6=[] ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" HandleID="k8s-pod-network.803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.483651 env[1220]: 2024-12-13 02:06:39.436 [INFO][2949] cni-plugin/k8s.go 386: Populated endpoint ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Namespace="default" Pod="nginx-deployment-85f456d6dd-kp89t" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"bd2ec361-43e4-4217-a0ff-5fd487160d13", ResourceVersion:"1206", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-kp89t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib1e278e5955", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:39.483651 env[1220]: 2024-12-13 02:06:39.436 [INFO][2949] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.130/32] ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Namespace="default" Pod="nginx-deployment-85f456d6dd-kp89t" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.483651 env[1220]: 2024-12-13 02:06:39.436 [INFO][2949] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib1e278e5955 ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Namespace="default" Pod="nginx-deployment-85f456d6dd-kp89t" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.483651 env[1220]: 2024-12-13 02:06:39.463 [INFO][2949] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Namespace="default" Pod="nginx-deployment-85f456d6dd-kp89t" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.483651 env[1220]: 2024-12-13 02:06:39.463 [INFO][2949] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Namespace="default" Pod="nginx-deployment-85f456d6dd-kp89t" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"bd2ec361-43e4-4217-a0ff-5fd487160d13", ResourceVersion:"1206", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837", Pod:"nginx-deployment-85f456d6dd-kp89t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib1e278e5955", MAC:"6a:69:90:ae:ea:fc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:39.483651 env[1220]: 2024-12-13 02:06:39.472 [INFO][2949] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837" Namespace="default" Pod="nginx-deployment-85f456d6dd-kp89t" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:06:39.552695 env[1220]: time="2024-12-13T02:06:39.552487757Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:39.552913 env[1220]: time="2024-12-13T02:06:39.552723862Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:39.552913 env[1220]: time="2024-12-13T02:06:39.552748835Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:39.562693 env[1220]: time="2024-12-13T02:06:39.555231928Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837 pid=3021 runtime=io.containerd.runc.v2 Dec 13 02:06:39.606134 systemd[1]: Started cri-containerd-803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837.scope. Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.644000 audit: BPF prog-id=114 op=LOAD Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3021 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:39.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830333136376131316333393132316239303163623865346134323365 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3021 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:39.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830333136376131316333393132316239303163623865346134323365 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit: BPF prog-id=115 op=LOAD Dec 13 02:06:39.645000 audit[3032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000255ce0 items=0 ppid=3021 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:39.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830333136376131316333393132316239303163623865346134323365 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit: BPF prog-id=116 op=LOAD Dec 13 02:06:39.645000 audit[3032]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000255d28 items=0 ppid=3021 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:39.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830333136376131316333393132316239303163623865346134323365 Dec 13 02:06:39.645000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:06:39.645000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:39.645000 audit: BPF prog-id=117 op=LOAD Dec 13 02:06:39.645000 audit[3032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d6138 items=0 ppid=3021 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:39.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830333136376131316333393132316239303163623865346134323365 Dec 13 02:06:39.716712 env[1220]: time="2024-12-13T02:06:39.714994358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-kp89t,Uid:bd2ec361-43e4-4217-a0ff-5fd487160d13,Namespace:default,Attempt:1,} returns sandbox id \"803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837\"" Dec 13 02:06:39.788469 kubelet[1569]: E1213 02:06:39.788405 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:39.971146 kubelet[1569]: I1213 02:06:39.971100 1569 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="94b816d2-bd05-4afb-8a4e-230ce84a964d" path="/var/lib/kubelet/pods/94b816d2-bd05-4afb-8a4e-230ce84a964d/volumes" Dec 13 02:06:40.034018 env[1220]: time="2024-12-13T02:06:40.033959145Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:40.038646 env[1220]: time="2024-12-13T02:06:40.038577310Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:40.042213 env[1220]: time="2024-12-13T02:06:40.042169515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:40.046030 env[1220]: time="2024-12-13T02:06:40.045980764Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:40.046765 env[1220]: time="2024-12-13T02:06:40.046718318Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:06:40.049221 env[1220]: time="2024-12-13T02:06:40.049187989Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:06:40.051580 env[1220]: time="2024-12-13T02:06:40.051528258Z" level=info msg="CreateContainer within sandbox \"48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:06:40.075352 env[1220]: time="2024-12-13T02:06:40.075262532Z" level=info msg="CreateContainer within sandbox \"48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"fa9ede99e3c43b0b34ea8d83158551ce036002809872e22abfa0a2aafd0a9d81\"" Dec 13 02:06:40.076378 env[1220]: time="2024-12-13T02:06:40.076269306Z" level=info msg="StartContainer for \"fa9ede99e3c43b0b34ea8d83158551ce036002809872e22abfa0a2aafd0a9d81\"" Dec 13 02:06:40.126807 systemd[1]: Started cri-containerd-fa9ede99e3c43b0b34ea8d83158551ce036002809872e22abfa0a2aafd0a9d81.scope. Dec 13 02:06:40.157000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.157000 audit[3066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1918c07648 items=0 ppid=2664 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:40.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661396564653939653363343362306233346561386438333135383535 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.158000 audit: BPF prog-id=118 op=LOAD Dec 13 02:06:40.158000 audit[3066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d8048 items=0 ppid=2664 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:40.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661396564653939653363343362306233346561386438333135383535 Dec 13 02:06:40.160000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.160000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.160000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.160000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.160000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.160000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.160000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.160000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.160000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.160000 audit: BPF prog-id=119 op=LOAD Dec 13 02:06:40.160000 audit[3066]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d8098 items=0 ppid=2664 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:40.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661396564653939653363343362306233346561386438333135383535 Dec 13 02:06:40.161000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:06:40.161000 audit: BPF prog-id=118 op=UNLOAD Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:40.161000 audit: BPF prog-id=120 op=LOAD Dec 13 02:06:40.161000 audit[3066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d8128 items=0 ppid=2664 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:40.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661396564653939653363343362306233346561386438333135383535 Dec 13 02:06:40.186851 env[1220]: time="2024-12-13T02:06:40.186785644Z" level=info msg="StartContainer for \"fa9ede99e3c43b0b34ea8d83158551ce036002809872e22abfa0a2aafd0a9d81\" returns successfully" Dec 13 02:06:40.440604 systemd[1]: cri-containerd-c2475c634f895f247df1562639bd0deb4da64d76fd0a35240e416afe039fca5c.scope: Deactivated successfully. Dec 13 02:06:40.446000 audit: BPF prog-id=113 op=UNLOAD Dec 13 02:06:40.476491 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c2475c634f895f247df1562639bd0deb4da64d76fd0a35240e416afe039fca5c-rootfs.mount: Deactivated successfully. Dec 13 02:06:40.524019 env[1220]: time="2024-12-13T02:06:40.523953425Z" level=info msg="shim disconnected" id=c2475c634f895f247df1562639bd0deb4da64d76fd0a35240e416afe039fca5c Dec 13 02:06:40.524019 env[1220]: time="2024-12-13T02:06:40.524022536Z" level=warning msg="cleaning up after shim disconnected" id=c2475c634f895f247df1562639bd0deb4da64d76fd0a35240e416afe039fca5c namespace=k8s.io Dec 13 02:06:40.524410 env[1220]: time="2024-12-13T02:06:40.524036176Z" level=info msg="cleaning up dead shim" Dec 13 02:06:40.536777 env[1220]: time="2024-12-13T02:06:40.536706612Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3105 runtime=io.containerd.runc.v2\n" Dec 13 02:06:40.789293 kubelet[1569]: E1213 02:06:40.789131 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:40.941661 kubelet[1569]: I1213 02:06:40.941615 1569 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:06:40.941661 kubelet[1569]: I1213 02:06:40.941661 1569 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:06:41.133504 kubelet[1569]: I1213 02:06:41.133434 1569 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-9p8wk" podStartSLOduration=27.756610633 podStartE2EDuration="32.133408284s" podCreationTimestamp="2024-12-13 02:06:09 +0000 UTC" firstStartedPulling="2024-12-13 02:06:35.671356926 +0000 UTC m=+26.553185020" lastFinishedPulling="2024-12-13 02:06:40.048154583 +0000 UTC m=+30.929982671" observedRunningTime="2024-12-13 02:06:41.133397891 +0000 UTC m=+32.015225989" watchObservedRunningTime="2024-12-13 02:06:41.133408284 +0000 UTC m=+32.015236385" Dec 13 02:06:41.164843 env[1220]: time="2024-12-13T02:06:41.164758414Z" level=info msg="CreateContainer within sandbox \"6020f811fc13f5978916aaf7490c7a38c107a1cfb6b0ba6b410bd1b893a98341\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:06:41.218256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2224170683.mount: Deactivated successfully. Dec 13 02:06:41.226550 env[1220]: time="2024-12-13T02:06:41.226477758Z" level=info msg="CreateContainer within sandbox \"6020f811fc13f5978916aaf7490c7a38c107a1cfb6b0ba6b410bd1b893a98341\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b3f4239d33f978d261e28fa95ce71942516fc26935a213e2abca8fcc6bd83494\"" Dec 13 02:06:41.228025 env[1220]: time="2024-12-13T02:06:41.227984660Z" level=info msg="StartContainer for \"b3f4239d33f978d261e28fa95ce71942516fc26935a213e2abca8fcc6bd83494\"" Dec 13 02:06:41.269224 systemd-networkd[1029]: calib1e278e5955: Gained IPv6LL Dec 13 02:06:41.286271 systemd[1]: Started cri-containerd-b3f4239d33f978d261e28fa95ce71942516fc26935a213e2abca8fcc6bd83494.scope. Dec 13 02:06:41.332000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.332000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f3860bc9aa0 items=0 ppid=2822 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233663432333964333366393738643236316532386661393563653731 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.334000 audit: BPF prog-id=121 op=LOAD Dec 13 02:06:41.334000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00031b718 items=0 ppid=2822 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233663432333964333366393738643236316532386661393563653731 Dec 13 02:06:41.335000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.335000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.335000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.335000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.335000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.335000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.335000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.335000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.335000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.335000 audit: BPF prog-id=122 op=LOAD Dec 13 02:06:41.335000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00031b768 items=0 ppid=2822 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233663432333964333366393738643236316532386661393563653731 Dec 13 02:06:41.336000 audit: BPF prog-id=122 op=UNLOAD Dec 13 02:06:41.337000 audit: BPF prog-id=121 op=UNLOAD Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:41.337000 audit: BPF prog-id=123 op=LOAD Dec 13 02:06:41.337000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00031b7f8 items=0 ppid=2822 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233663432333964333366393738643236316532386661393563653731 Dec 13 02:06:41.480141 env[1220]: time="2024-12-13T02:06:41.480031531Z" level=info msg="StartContainer for \"b3f4239d33f978d261e28fa95ce71942516fc26935a213e2abca8fcc6bd83494\" returns successfully" Dec 13 02:06:41.790487 kubelet[1569]: E1213 02:06:41.790332 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:42.146133 kubelet[1569]: I1213 02:06:42.146060 1569 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-pwd9n" podStartSLOduration=4.146039087 podStartE2EDuration="4.146039087s" podCreationTimestamp="2024-12-13 02:06:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:06:42.14466081 +0000 UTC m=+33.026488908" watchObservedRunningTime="2024-12-13 02:06:42.146039087 +0000 UTC m=+33.027867182" Dec 13 02:06:42.791841 kubelet[1569]: E1213 02:06:42.791744 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:42.821000 audit[3217]: AVC avc: denied { write } for pid=3217 comm="tee" name="fd" dev="proc" ino=22368 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:42.842000 audit[3228]: AVC avc: denied { write } for pid=3228 comm="tee" name="fd" dev="proc" ino=22379 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:42.821000 audit[3217]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc811e09f7 a2=241 a3=1b6 items=1 ppid=3192 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:42.821000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:06:42.821000 audit: PATH item=0 name="/dev/fd/63" inode=22352 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:42.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:42.842000 audit[3228]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc534819f7 a2=241 a3=1b6 items=1 ppid=3198 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:42.842000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:06:42.842000 audit: PATH item=0 name="/dev/fd/63" inode=22365 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:42.842000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:42.876000 audit[3253]: AVC avc: denied { write } for pid=3253 comm="tee" name="fd" dev="proc" ino=22392 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:42.889000 audit[3241]: AVC avc: denied { write } for pid=3241 comm="tee" name="fd" dev="proc" ino=22402 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:42.876000 audit[3253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd073289e7 a2=241 a3=1b6 items=1 ppid=3196 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:42.876000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:06:42.890000 audit[3233]: AVC avc: denied { write } for pid=3233 comm="tee" name="fd" dev="proc" ino=22404 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:42.876000 audit: PATH item=0 name="/dev/fd/63" inode=22386 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:42.876000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:42.889000 audit[3241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2ba819f8 a2=241 a3=1b6 items=1 ppid=3201 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:42.889000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:06:42.889000 audit: PATH item=0 name="/dev/fd/63" inode=22381 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:42.890000 audit[3233]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed9cb29f7 a2=241 a3=1b6 items=1 ppid=3194 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:42.889000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:42.890000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:06:42.890000 audit: PATH item=0 name="/dev/fd/63" inode=22376 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:42.890000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:42.892000 audit[3231]: AVC avc: denied { write } for pid=3231 comm="tee" name="fd" dev="proc" ino=22407 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:42.892000 audit[3231]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfc46c9e8 a2=241 a3=1b6 items=1 ppid=3187 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:42.892000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:06:42.892000 audit: PATH item=0 name="/dev/fd/63" inode=22373 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:42.892000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:42.896000 audit[3246]: AVC avc: denied { write } for pid=3246 comm="tee" name="fd" dev="proc" ino=22410 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:42.896000 audit[3246]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcf7549f9 a2=241 a3=1b6 items=1 ppid=3186 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:42.896000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:06:42.896000 audit: PATH item=0 name="/dev/fd/63" inode=22382 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:42.896000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:42.955643 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4054984319.mount: Deactivated successfully. Dec 13 02:06:42.967923 env[1220]: time="2024-12-13T02:06:42.967865257Z" level=info msg="StopPodSandbox for \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\"" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.178 [INFO][3275] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.179 [INFO][3275] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" iface="eth0" netns="/var/run/netns/cni-a81a8b1d-eff9-1b8a-dc22-6488489f5e31" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.179 [INFO][3275] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" iface="eth0" netns="/var/run/netns/cni-a81a8b1d-eff9-1b8a-dc22-6488489f5e31" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.179 [INFO][3275] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" iface="eth0" netns="/var/run/netns/cni-a81a8b1d-eff9-1b8a-dc22-6488489f5e31" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.179 [INFO][3275] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.179 [INFO][3275] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.279 [INFO][3283] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" HandleID="k8s-pod-network.8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.279 [INFO][3283] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.279 [INFO][3283] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.290 [WARNING][3283] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" HandleID="k8s-pod-network.8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.290 [INFO][3283] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" HandleID="k8s-pod-network.8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.292 [INFO][3283] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:43.296277 env[1220]: 2024-12-13 02:06:43.294 [INFO][3275] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:06:43.305552 env[1220]: time="2024-12-13T02:06:43.302673430Z" level=info msg="TearDown network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\" successfully" Dec 13 02:06:43.305552 env[1220]: time="2024-12-13T02:06:43.302805529Z" level=info msg="StopPodSandbox for \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\" returns successfully" Dec 13 02:06:43.305552 env[1220]: time="2024-12-13T02:06:43.304487111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c9c6cdc4c-t5kwn,Uid:5bc10486-3a9c-4241-9d17-6cb8085e7bf2,Namespace:calico-system,Attempt:1,}" Dec 13 02:06:43.300385 systemd[1]: run-netns-cni\x2da81a8b1d\x2deff9\x2d1b8a\x2ddc22\x2d6488489f5e31.mount: Deactivated successfully. Dec 13 02:06:43.510552 kernel: kauditd_printk_skb: 358 callbacks suppressed Dec 13 02:06:43.510761 kernel: audit: type=1400 audit(1734055603.483:732): avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.548716 kernel: audit: type=1400 audit(1734055603.483:732): avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.590711 kernel: audit: type=1400 audit(1734055603.483:732): avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.590853 kernel: audit: type=1400 audit(1734055603.483:732): avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.626248 kernel: audit: type=1400 audit(1734055603.483:732): avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.648707 kernel: audit: type=1400 audit(1734055603.483:732): avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.692134 kernel: audit: type=1400 audit(1734055603.483:732): avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.713725 kernel: audit: type=1400 audit(1734055603.483:732): avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.734720 kernel: audit: type=1400 audit(1734055603.483:732): avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.483000 audit: BPF prog-id=124 op=LOAD Dec 13 02:06:43.747704 kernel: audit: type=1334 audit(1734055603.483:732): prog-id=124 op=LOAD Dec 13 02:06:43.483000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe823becd0 a2=98 a3=3 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.515000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit: BPF prog-id=125 op=LOAD Dec 13 02:06:43.515000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe823beab0 a2=74 a3=540051 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.515000 audit: BPF prog-id=125 op=UNLOAD Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.515000 audit: BPF prog-id=126 op=LOAD Dec 13 02:06:43.515000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe823beae0 a2=94 a3=2 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.515000 audit: BPF prog-id=126 op=UNLOAD Dec 13 02:06:43.793495 kubelet[1569]: E1213 02:06:43.792537 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:43.805000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.805000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.805000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.805000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.805000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.805000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.805000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.805000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.805000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.805000 audit: BPF prog-id=127 op=LOAD Dec 13 02:06:43.805000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe823be9a0 a2=40 a3=1 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.805000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.806000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:06:43.806000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.806000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe823bea70 a2=50 a3=7ffe823beb50 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.822000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.822000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe823be9b0 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.822000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.822000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe823be9e0 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.822000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.822000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe823be8f0 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.822000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.822000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe823bea00 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.822000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.822000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe823be9e0 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe823be9d0 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe823bea00 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe823be9e0 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe823bea00 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe823be9d0 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe823bea40 a2=28 a3=0 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe823be7f0 a2=50 a3=1 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit: BPF prog-id=128 op=LOAD Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe823be7f0 a2=94 a3=5 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe823be8a0 a2=50 a3=1 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe823be9c0 a2=4 a3=38 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.823000 audit[3336]: AVC avc: denied { confidentiality } for pid=3336 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:43.823000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe823bea10 a2=94 a3=6 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { confidentiality } for pid=3336 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:43.824000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe823be1c0 a2=94 a3=83 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.840725 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.824000 audit[3336]: AVC avc: denied { confidentiality } for pid=3336 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:43.824000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe823be1c0 a2=94 a3=83 items=0 ppid=3193 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:43.832212 systemd-networkd[1029]: cali85f93727519: Link UP Dec 13 02:06:43.848706 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali85f93727519: link becomes ready Dec 13 02:06:43.853964 systemd-networkd[1029]: cali85f93727519: Gained carrier Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit: BPF prog-id=129 op=LOAD Dec 13 02:06:43.863000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc44a48780 a2=98 a3=1999999999999999 items=0 ppid=3193 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.863000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:43.863000 audit: BPF prog-id=129 op=UNLOAD Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit: BPF prog-id=130 op=LOAD Dec 13 02:06:43.863000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc44a48660 a2=74 a3=ffff items=0 ppid=3193 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.863000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:43.863000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:43.863000 audit: BPF prog-id=131 op=LOAD Dec 13 02:06:43.863000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc44a486a0 a2=40 a3=7ffc44a48880 items=0 ppid=3193 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:43.863000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:43.864000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.450 [INFO][3296] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0 calico-kube-controllers-6c9c6cdc4c- calico-system 5bc10486-3a9c-4241-9d17-6cb8085e7bf2 1243 0 2024-12-13 02:06:27 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6c9c6cdc4c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s 10.128.0.29 calico-kube-controllers-6c9c6cdc4c-t5kwn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali85f93727519 [] []}} ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Namespace="calico-system" Pod="calico-kube-controllers-6c9c6cdc4c-t5kwn" WorkloadEndpoint="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.450 [INFO][3296] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Namespace="calico-system" Pod="calico-kube-controllers-6c9c6cdc4c-t5kwn" WorkloadEndpoint="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.740 [INFO][3330] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" HandleID="k8s-pod-network.c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.778 [INFO][3330] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" HandleID="k8s-pod-network.c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000396a10), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.29", "pod":"calico-kube-controllers-6c9c6cdc4c-t5kwn", "timestamp":"2024-12-13 02:06:43.739989764 +0000 UTC"}, Hostname:"10.128.0.29", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.778 [INFO][3330] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.778 [INFO][3330] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.778 [INFO][3330] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.29' Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.780 [INFO][3330] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" host="10.128.0.29" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.788 [INFO][3330] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.29" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.797 [INFO][3330] ipam/ipam.go 489: Trying affinity for 192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.799 [INFO][3330] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.802 [INFO][3330] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.802 [INFO][3330] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" host="10.128.0.29" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.804 [INFO][3330] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754 Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.809 [INFO][3330] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" host="10.128.0.29" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.818 [INFO][3330] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.131/26] block=192.168.125.128/26 handle="k8s-pod-network.c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" host="10.128.0.29" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.818 [INFO][3330] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.131/26] handle="k8s-pod-network.c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" host="10.128.0.29" Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.818 [INFO][3330] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:43.878767 env[1220]: 2024-12-13 02:06:43.818 [INFO][3330] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.131/26] IPv6=[] ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" HandleID="k8s-pod-network.c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.880029 env[1220]: 2024-12-13 02:06:43.821 [INFO][3296] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Namespace="calico-system" Pod="calico-kube-controllers-6c9c6cdc4c-t5kwn" WorkloadEndpoint="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0", GenerateName:"calico-kube-controllers-6c9c6cdc4c-", Namespace:"calico-system", SelfLink:"", UID:"5bc10486-3a9c-4241-9d17-6cb8085e7bf2", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c9c6cdc4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"", Pod:"calico-kube-controllers-6c9c6cdc4c-t5kwn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali85f93727519", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:43.880029 env[1220]: 2024-12-13 02:06:43.821 [INFO][3296] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.131/32] ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Namespace="calico-system" Pod="calico-kube-controllers-6c9c6cdc4c-t5kwn" WorkloadEndpoint="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.880029 env[1220]: 2024-12-13 02:06:43.821 [INFO][3296] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali85f93727519 ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Namespace="calico-system" Pod="calico-kube-controllers-6c9c6cdc4c-t5kwn" WorkloadEndpoint="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.880029 env[1220]: 2024-12-13 02:06:43.864 [INFO][3296] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Namespace="calico-system" Pod="calico-kube-controllers-6c9c6cdc4c-t5kwn" WorkloadEndpoint="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.880029 env[1220]: 2024-12-13 02:06:43.864 [INFO][3296] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Namespace="calico-system" Pod="calico-kube-controllers-6c9c6cdc4c-t5kwn" WorkloadEndpoint="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0", GenerateName:"calico-kube-controllers-6c9c6cdc4c-", Namespace:"calico-system", SelfLink:"", UID:"5bc10486-3a9c-4241-9d17-6cb8085e7bf2", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c9c6cdc4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754", Pod:"calico-kube-controllers-6c9c6cdc4c-t5kwn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali85f93727519", MAC:"d2:ee:bb:61:c3:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:43.880029 env[1220]: 2024-12-13 02:06:43.875 [INFO][3296] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754" Namespace="calico-system" Pod="calico-kube-controllers-6c9c6cdc4c-t5kwn" WorkloadEndpoint="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:06:43.941993 env[1220]: time="2024-12-13T02:06:43.941903793Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:43.942378 env[1220]: time="2024-12-13T02:06:43.942334416Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:43.942556 env[1220]: time="2024-12-13T02:06:43.942522872Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:43.942943 env[1220]: time="2024-12-13T02:06:43.942896861Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754 pid=3376 runtime=io.containerd.runc.v2 Dec 13 02:06:44.008106 systemd-networkd[1029]: vxlan.calico: Link UP Dec 13 02:06:44.008120 systemd-networkd[1029]: vxlan.calico: Gained carrier Dec 13 02:06:44.013723 systemd[1]: Started cri-containerd-c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754.scope. Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.061000 audit: BPF prog-id=132 op=LOAD Dec 13 02:06:44.063000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.063000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3376 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333936613730303161313637653237666561373933653734623930 Dec 13 02:06:44.064000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.064000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3376 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333936613730303161313637653237666561373933653734623930 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.065000 audit: BPF prog-id=133 op=LOAD Dec 13 02:06:44.065000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003db050 items=0 ppid=3376 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333936613730303161313637653237666561373933653734623930 Dec 13 02:06:44.066000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.066000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.066000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.066000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.066000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.066000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.066000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.066000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.066000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.066000 audit: BPF prog-id=134 op=LOAD Dec 13 02:06:44.066000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003db098 items=0 ppid=3376 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333936613730303161313637653237666561373933653734623930 Dec 13 02:06:44.068000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:06:44.068000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.068000 audit: BPF prog-id=135 op=LOAD Dec 13 02:06:44.068000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003db4a8 items=0 ppid=3376 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333936613730303161313637653237666561373933653734623930 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit: BPF prog-id=136 op=LOAD Dec 13 02:06:44.092000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd6be3e60 a2=98 a3=ffffffff items=0 ppid=3193 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.092000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:44.092000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit: BPF prog-id=137 op=LOAD Dec 13 02:06:44.092000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd6be3c70 a2=74 a3=540051 items=0 ppid=3193 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.092000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:44.092000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit: BPF prog-id=138 op=LOAD Dec 13 02:06:44.092000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd6be3ca0 a2=94 a3=2 items=0 ppid=3193 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.092000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:44.092000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd6be3b70 a2=28 a3=0 items=0 ppid=3193 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.092000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:44.092000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.092000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd6be3ba0 a2=28 a3=0 items=0 ppid=3193 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.092000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:44.093000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.093000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd6be3ab0 a2=28 a3=0 items=0 ppid=3193 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:44.093000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.093000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd6be3bc0 a2=28 a3=0 items=0 ppid=3193 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:44.093000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.093000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd6be3ba0 a2=28 a3=0 items=0 ppid=3193 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:44.093000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.093000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdd6be3b90 a2=28 a3=0 items=0 ppid=3193 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:44.113000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.113000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.113000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.113000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.113000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.113000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.113000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.113000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.113000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.113000 audit: BPF prog-id=142 op=LOAD Dec 13 02:06:44.113000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff212b4ff0 a2=98 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.113000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.114000 audit: BPF prog-id=142 op=UNLOAD Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit: BPF prog-id=143 op=LOAD Dec 13 02:06:44.114000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff212b4dd0 a2=74 a3=540051 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.114000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.114000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.114000 audit: BPF prog-id=144 op=LOAD Dec 13 02:06:44.114000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff212b4e00 a2=94 a3=2 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.114000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.114000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:06:44.194875 env[1220]: time="2024-12-13T02:06:44.194820258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c9c6cdc4c-t5kwn,Uid:5bc10486-3a9c-4241-9d17-6cb8085e7bf2,Namespace:calico-system,Attempt:1,} returns sandbox id \"c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754\"" Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit: BPF prog-id=145 op=LOAD Dec 13 02:06:44.372000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff212b4cc0 a2=40 a3=1 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.372000 audit: BPF prog-id=145 op=UNLOAD Dec 13 02:06:44.372000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.372000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff212b4d90 a2=50 a3=7fff212b4e70 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff212b4cd0 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff212b4d00 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff212b4c10 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff212b4d20 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff212b4d00 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff212b4cf0 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff212b4d20 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff212b4d00 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff212b4d20 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff212b4cf0 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff212b4d60 a2=28 a3=0 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff212b4b10 a2=50 a3=1 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.389000 audit: BPF prog-id=146 op=LOAD Dec 13 02:06:44.389000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff212b4b10 a2=94 a3=5 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.389000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.390000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff212b4bc0 a2=50 a3=1 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff212b4ce0 a2=4 a3=38 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:44.390000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff212b4d30 a2=94 a3=6 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:44.390000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff212b44e0 a2=94 a3=83 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.390000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:44.390000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff212b44e0 a2=94 a3=83 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.391000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.391000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff212b5f20 a2=10 a3=f1f00800 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.391000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.391000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff212b5dc0 a2=10 a3=3 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.392000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.392000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff212b5d60 a2=10 a3=3 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.392000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.392000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:44.392000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff212b5d60 a2=10 a3=7 items=0 ppid=3193 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.392000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:44.400000 audit: BPF prog-id=141 op=UNLOAD Dec 13 02:06:44.542000 audit[3456]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=3456 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:44.542000 audit[3456]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff27671b10 a2=0 a3=7fff27671afc items=0 ppid=3193 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.542000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:44.566000 audit[3455]: NETFILTER_CFG table=raw:74 family=2 entries=21 op=nft_register_chain pid=3455 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:44.566000 audit[3455]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe92c3bcc0 a2=0 a3=7ffe92c3bcac items=0 ppid=3193 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:44.588000 audit[3457]: NETFILTER_CFG table=nat:75 family=2 entries=15 op=nft_register_chain pid=3457 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:44.588000 audit[3457]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeff2fdcd0 a2=0 a3=7ffeff2fdcbc items=0 ppid=3193 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.588000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:44.593000 audit[3458]: NETFILTER_CFG table=filter:76 family=2 entries=125 op=nft_register_chain pid=3458 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:44.593000 audit[3458]: SYSCALL arch=c000003e syscall=46 success=yes exit=69556 a0=3 a1=7fffc8a5f4f0 a2=0 a3=7fffc8a5f4dc items=0 ppid=3193 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:44.593000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:44.802383 kubelet[1569]: E1213 02:06:44.793770 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:44.981041 systemd-networkd[1029]: cali85f93727519: Gained IPv6LL Dec 13 02:06:45.794017 kubelet[1569]: E1213 02:06:45.793925 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:45.827014 env[1220]: time="2024-12-13T02:06:45.826947457Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:45.829920 env[1220]: time="2024-12-13T02:06:45.829871892Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:45.832390 env[1220]: time="2024-12-13T02:06:45.832352637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:45.834648 env[1220]: time="2024-12-13T02:06:45.834602436Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:45.835616 env[1220]: time="2024-12-13T02:06:45.835563022Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:06:45.837870 env[1220]: time="2024-12-13T02:06:45.837824436Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:06:45.839596 env[1220]: time="2024-12-13T02:06:45.839545681Z" level=info msg="CreateContainer within sandbox \"803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 02:06:45.859066 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3206069116.mount: Deactivated successfully. Dec 13 02:06:45.871985 env[1220]: time="2024-12-13T02:06:45.871899322Z" level=info msg="CreateContainer within sandbox \"803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"57b0341169ec2b9d8e68516cd32c571a3bc8ab256574a41ad3b8f1e3ca24a7aa\"" Dec 13 02:06:45.872970 env[1220]: time="2024-12-13T02:06:45.872911698Z" level=info msg="StartContainer for \"57b0341169ec2b9d8e68516cd32c571a3bc8ab256574a41ad3b8f1e3ca24a7aa\"" Dec 13 02:06:45.916856 systemd[1]: Started cri-containerd-57b0341169ec2b9d8e68516cd32c571a3bc8ab256574a41ad3b8f1e3ca24a7aa.scope. Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.935000 audit: BPF prog-id=147 op=LOAD Dec 13 02:06:45.936000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.936000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3021 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623033343131363965633262396438653638353136636433326335 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3021 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623033343131363965633262396438653638353136636433326335 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit: BPF prog-id=148 op=LOAD Dec 13 02:06:45.937000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000296c60 items=0 ppid=3021 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623033343131363965633262396438653638353136636433326335 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit: BPF prog-id=149 op=LOAD Dec 13 02:06:45.937000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000296ca8 items=0 ppid=3021 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623033343131363965633262396438653638353136636433326335 Dec 13 02:06:45.937000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:06:45.937000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:45.937000 audit: BPF prog-id=150 op=LOAD Dec 13 02:06:45.937000 audit[3476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002970b8 items=0 ppid=3021 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623033343131363965633262396438653638353136636433326335 Dec 13 02:06:45.960739 env[1220]: time="2024-12-13T02:06:45.960455293Z" level=info msg="StartContainer for \"57b0341169ec2b9d8e68516cd32c571a3bc8ab256574a41ad3b8f1e3ca24a7aa\" returns successfully" Dec 13 02:06:46.069041 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Dec 13 02:06:46.794657 kubelet[1569]: E1213 02:06:46.794582 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:46.856209 systemd[1]: run-containerd-runc-k8s.io-57b0341169ec2b9d8e68516cd32c571a3bc8ab256574a41ad3b8f1e3ca24a7aa-runc.FjR77U.mount: Deactivated successfully. Dec 13 02:06:47.795355 kubelet[1569]: E1213 02:06:47.795274 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:47.818821 env[1220]: time="2024-12-13T02:06:47.818755724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:47.821748 env[1220]: time="2024-12-13T02:06:47.821671470Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:47.824074 env[1220]: time="2024-12-13T02:06:47.824014098Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:47.826466 env[1220]: time="2024-12-13T02:06:47.826416139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:47.827442 env[1220]: time="2024-12-13T02:06:47.827391985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:06:47.854220 env[1220]: time="2024-12-13T02:06:47.854165985Z" level=info msg="CreateContainer within sandbox \"c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:06:47.874885 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2167249073.mount: Deactivated successfully. Dec 13 02:06:47.880157 env[1220]: time="2024-12-13T02:06:47.880080915Z" level=info msg="CreateContainer within sandbox \"c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b633378c36a7d98c43393a41e0e64e38155bfbab512c395ba2d01b5deb74162f\"" Dec 13 02:06:47.884899 env[1220]: time="2024-12-13T02:06:47.884617091Z" level=info msg="StartContainer for \"b633378c36a7d98c43393a41e0e64e38155bfbab512c395ba2d01b5deb74162f\"" Dec 13 02:06:47.926318 systemd[1]: Started cri-containerd-b633378c36a7d98c43393a41e0e64e38155bfbab512c395ba2d01b5deb74162f.scope. Dec 13 02:06:47.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.943000 audit: BPF prog-id=151 op=LOAD Dec 13 02:06:47.943000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.943000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3376 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:47.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333333373863333661376439386334333339336134316530653634 Dec 13 02:06:47.943000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.943000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3376 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:47.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333333373863333661376439386334333339336134316530653634 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit: BPF prog-id=152 op=LOAD Dec 13 02:06:47.944000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001fa830 items=0 ppid=3376 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:47.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333333373863333661376439386334333339336134316530653634 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit: BPF prog-id=153 op=LOAD Dec 13 02:06:47.944000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001fa878 items=0 ppid=3376 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:47.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333333373863333661376439386334333339336134316530653634 Dec 13 02:06:47.944000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:06:47.944000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:47.944000 audit: BPF prog-id=154 op=LOAD Dec 13 02:06:47.944000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001fac88 items=0 ppid=3376 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:47.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333333373863333661376439386334333339336134316530653634 Dec 13 02:06:47.993581 env[1220]: time="2024-12-13T02:06:47.993520165Z" level=info msg="StartContainer for \"b633378c36a7d98c43393a41e0e64e38155bfbab512c395ba2d01b5deb74162f\" returns successfully" Dec 13 02:06:48.162862 kubelet[1569]: I1213 02:06:48.162280 1569 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-kp89t" podStartSLOduration=19.041975702 podStartE2EDuration="25.162237072s" podCreationTimestamp="2024-12-13 02:06:23 +0000 UTC" firstStartedPulling="2024-12-13 02:06:39.717286149 +0000 UTC m=+30.599114229" lastFinishedPulling="2024-12-13 02:06:45.837547485 +0000 UTC m=+36.719375599" observedRunningTime="2024-12-13 02:06:46.153594195 +0000 UTC m=+37.035422293" watchObservedRunningTime="2024-12-13 02:06:48.162237072 +0000 UTC m=+39.044065171" Dec 13 02:06:48.162862 kubelet[1569]: I1213 02:06:48.162482 1569 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6c9c6cdc4c-t5kwn" podStartSLOduration=17.53073795 podStartE2EDuration="21.162475289s" podCreationTimestamp="2024-12-13 02:06:27 +0000 UTC" firstStartedPulling="2024-12-13 02:06:44.197233964 +0000 UTC m=+35.079062036" lastFinishedPulling="2024-12-13 02:06:47.828971296 +0000 UTC m=+38.710799375" observedRunningTime="2024-12-13 02:06:48.16179468 +0000 UTC m=+39.043622779" watchObservedRunningTime="2024-12-13 02:06:48.162475289 +0000 UTC m=+39.044303386" Dec 13 02:06:48.795821 kubelet[1569]: E1213 02:06:48.795753 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:48.867652 systemd[1]: run-containerd-runc-k8s.io-b633378c36a7d98c43393a41e0e64e38155bfbab512c395ba2d01b5deb74162f-runc.DrPUm9.mount: Deactivated successfully. Dec 13 02:06:49.764172 kubelet[1569]: E1213 02:06:49.764112 1569 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:49.796703 kubelet[1569]: E1213 02:06:49.796623 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:50.151278 kubelet[1569]: I1213 02:06:50.151240 1569 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:06:50.187593 systemd[1]: run-containerd-runc-k8s.io-b3f4239d33f978d261e28fa95ce71942516fc26935a213e2abca8fcc6bd83494-runc.KkFs6E.mount: Deactivated successfully. Dec 13 02:06:50.204000 audit[3600]: NETFILTER_CFG table=filter:77 family=2 entries=20 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.210807 kernel: kauditd_printk_skb: 703 callbacks suppressed Dec 13 02:06:50.210948 kernel: audit: type=1325 audit(1734055610.204:869): table=filter:77 family=2 entries=20 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.204000 audit[3600]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd944f7880 a2=0 a3=7ffd944f786c items=0 ppid=1738 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.261797 kernel: audit: type=1300 audit(1734055610.204:869): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd944f7880 a2=0 a3=7ffd944f786c items=0 ppid=1738 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.277650 kubelet[1569]: I1213 02:06:50.262815 1569 topology_manager.go:215] "Topology Admit Handler" podUID="64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 02:06:50.277811 kernel: audit: type=1327 audit(1734055610.204:869): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.267000 audit[3600]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.295863 kernel: audit: type=1325 audit(1734055610.267:870): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.267000 audit[3600]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd944f7880 a2=0 a3=0 items=0 ppid=1738 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.330717 kernel: audit: type=1300 audit(1734055610.267:870): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd944f7880 a2=0 a3=0 items=0 ppid=1738 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.335918 systemd[1]: Created slice kubepods-besteffort-pod64d22fb6_6ae4_4f22_af2a_0dd6b57f3c1c.slice. Dec 13 02:06:50.267000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.335000 audit[3614]: NETFILTER_CFG table=filter:79 family=2 entries=32 op=nft_register_rule pid=3614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.370605 kernel: audit: type=1327 audit(1734055610.267:870): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.370848 kernel: audit: type=1325 audit(1734055610.335:871): table=filter:79 family=2 entries=32 op=nft_register_rule pid=3614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.370946 kernel: audit: type=1300 audit(1734055610.335:871): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffe24d2090 a2=0 a3=7fffe24d207c items=0 ppid=1738 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.335000 audit[3614]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffe24d2090 a2=0 a3=7fffe24d207c items=0 ppid=1738 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.399737 kubelet[1569]: I1213 02:06:50.399508 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ctrqf\" (UniqueName: \"kubernetes.io/projected/64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c-kube-api-access-ctrqf\") pod \"nfs-server-provisioner-0\" (UID: \"64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c\") " pod="default/nfs-server-provisioner-0" Dec 13 02:06:50.399737 kubelet[1569]: I1213 02:06:50.399573 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c-data\") pod \"nfs-server-provisioner-0\" (UID: \"64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c\") " pod="default/nfs-server-provisioner-0" Dec 13 02:06:50.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.430713 kernel: audit: type=1327 audit(1734055610.335:871): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.356000 audit[3614]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=3614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.449729 kernel: audit: type=1325 audit(1734055610.356:872): table=nat:80 family=2 entries=22 op=nft_register_rule pid=3614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.356000 audit[3614]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffe24d2090 a2=0 a3=0 items=0 ppid=1738 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.641221 env[1220]: time="2024-12-13T02:06:50.641164097Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c,Namespace:default,Attempt:0,}" Dec 13 02:06:50.794302 systemd-networkd[1029]: cali60e51b789ff: Link UP Dec 13 02:06:50.797393 kubelet[1569]: E1213 02:06:50.797322 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:50.803815 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:06:50.803966 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 02:06:50.804541 systemd-networkd[1029]: cali60e51b789ff: Gained carrier Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.703 [INFO][3636] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.29-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c 1296 0 2024-12-13 02:06:50 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.29 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.703 [INFO][3636] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.740 [INFO][3648] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" HandleID="k8s-pod-network.ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Workload="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.751 [INFO][3648] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" HandleID="k8s-pod-network.ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Workload="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003bcc80), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.29", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 02:06:50.740252872 +0000 UTC"}, Hostname:"10.128.0.29", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.751 [INFO][3648] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.752 [INFO][3648] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.752 [INFO][3648] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.29' Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.754 [INFO][3648] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" host="10.128.0.29" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.759 [INFO][3648] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.29" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.764 [INFO][3648] ipam/ipam.go 489: Trying affinity for 192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.766 [INFO][3648] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.769 [INFO][3648] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.769 [INFO][3648] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" host="10.128.0.29" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.771 [INFO][3648] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.777 [INFO][3648] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" host="10.128.0.29" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.784 [INFO][3648] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.132/26] block=192.168.125.128/26 handle="k8s-pod-network.ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" host="10.128.0.29" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.785 [INFO][3648] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.132/26] handle="k8s-pod-network.ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" host="10.128.0.29" Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.785 [INFO][3648] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:50.827318 env[1220]: 2024-12-13 02:06:50.785 [INFO][3648] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.132/26] IPv6=[] ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" HandleID="k8s-pod-network.ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Workload="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:50.831080 env[1220]: 2024-12-13 02:06:50.786 [INFO][3636] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:50.831080 env[1220]: 2024-12-13 02:06:50.787 [INFO][3636] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.132/32] ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:50.831080 env[1220]: 2024-12-13 02:06:50.787 [INFO][3636] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:50.831080 env[1220]: 2024-12-13 02:06:50.804 [INFO][3636] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:50.831447 env[1220]: 2024-12-13 02:06:50.806 [INFO][3636] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"82:ae:ce:a6:47:c7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:50.831447 env[1220]: 2024-12-13 02:06:50.822 [INFO][3636] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:50.843000 audit[3669]: NETFILTER_CFG table=filter:81 family=2 entries=42 op=nft_register_chain pid=3669 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:50.843000 audit[3669]: SYSCALL arch=c000003e syscall=46 success=yes exit=21008 a0=3 a1=7ffe1fa4de30 a2=0 a3=7ffe1fa4de1c items=0 ppid=3193 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.843000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:50.854095 env[1220]: time="2024-12-13T02:06:50.853983763Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:50.854435 env[1220]: time="2024-12-13T02:06:50.854359326Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:50.854655 env[1220]: time="2024-12-13T02:06:50.854597058Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:50.855092 env[1220]: time="2024-12-13T02:06:50.855012099Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b pid=3676 runtime=io.containerd.runc.v2 Dec 13 02:06:50.873057 systemd[1]: Started cri-containerd-ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b.scope. Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.895000 audit: BPF prog-id=155 op=LOAD Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3676 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643064633535333162343339313766616261386130356433636437 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3676 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643064633535333162343339313766616261386130356433636437 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit: BPF prog-id=156 op=LOAD Dec 13 02:06:50.896000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000188aa0 items=0 ppid=3676 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643064633535333162343339313766616261386130356433636437 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit: BPF prog-id=157 op=LOAD Dec 13 02:06:50.896000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000188ae8 items=0 ppid=3676 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643064633535333162343339313766616261386130356433636437 Dec 13 02:06:50.896000 audit: BPF prog-id=157 op=UNLOAD Dec 13 02:06:50.896000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:50.896000 audit: BPF prog-id=158 op=LOAD Dec 13 02:06:50.896000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000188ef8 items=0 ppid=3676 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643064633535333162343339313766616261386130356433636437 Dec 13 02:06:50.939136 env[1220]: time="2024-12-13T02:06:50.938443630Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:64d22fb6-6ae4-4f22-af2a-0dd6b57f3c1c,Namespace:default,Attempt:0,} returns sandbox id \"ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b\"" Dec 13 02:06:50.940729 env[1220]: time="2024-12-13T02:06:50.940602891Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 02:06:51.797838 kubelet[1569]: E1213 02:06:51.797764 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:52.277021 systemd-networkd[1029]: cali60e51b789ff: Gained IPv6LL Dec 13 02:06:52.798849 kubelet[1569]: E1213 02:06:52.798771 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:53.528442 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4185817369.mount: Deactivated successfully. Dec 13 02:06:53.799655 kubelet[1569]: E1213 02:06:53.799197 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:54.800335 kubelet[1569]: E1213 02:06:54.800231 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:55.800787 kubelet[1569]: E1213 02:06:55.800642 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:56.035560 env[1220]: time="2024-12-13T02:06:56.035482771Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:56.038520 env[1220]: time="2024-12-13T02:06:56.038466399Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:56.041096 env[1220]: time="2024-12-13T02:06:56.041044689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:56.043487 env[1220]: time="2024-12-13T02:06:56.043442546Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:56.044508 env[1220]: time="2024-12-13T02:06:56.044451867Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 02:06:56.055936 env[1220]: time="2024-12-13T02:06:56.055784004Z" level=info msg="CreateContainer within sandbox \"ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 02:06:56.084703 env[1220]: time="2024-12-13T02:06:56.084610171Z" level=info msg="CreateContainer within sandbox \"ddd0dc5531b43917faba8a05d3cd7d2838f04e07acc82ba90e2e7f1274612b9b\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"7940c4e77d48d9709d9b8ae7a69cd80987f8de087bd5c8bda1e3f993cb6bae48\"" Dec 13 02:06:56.085696 env[1220]: time="2024-12-13T02:06:56.085612098Z" level=info msg="StartContainer for \"7940c4e77d48d9709d9b8ae7a69cd80987f8de087bd5c8bda1e3f993cb6bae48\"" Dec 13 02:06:56.131025 systemd[1]: run-containerd-runc-k8s.io-7940c4e77d48d9709d9b8ae7a69cd80987f8de087bd5c8bda1e3f993cb6bae48-runc.muXvkN.mount: Deactivated successfully. Dec 13 02:06:56.135190 systemd[1]: Started cri-containerd-7940c4e77d48d9709d9b8ae7a69cd80987f8de087bd5c8bda1e3f993cb6bae48.scope. Dec 13 02:06:56.161526 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 02:06:56.161707 kernel: audit: type=1400 audit(1734055616.153:892): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.200430 kernel: audit: type=1400 audit(1734055616.153:893): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221108 kernel: audit: type=1400 audit(1734055616.153:894): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.247742 kernel: audit: type=1400 audit(1734055616.153:895): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.289924 kernel: audit: type=1400 audit(1734055616.153:896): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.290103 kernel: audit: type=1400 audit(1734055616.153:897): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.290150 kernel: audit: type=1400 audit(1734055616.153:898): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.310879 kernel: audit: type=1400 audit(1734055616.153:899): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.353247 env[1220]: time="2024-12-13T02:06:56.353191249Z" level=info msg="StartContainer for \"7940c4e77d48d9709d9b8ae7a69cd80987f8de087bd5c8bda1e3f993cb6bae48\" returns successfully" Dec 13 02:06:56.373257 kernel: audit: type=1400 audit(1734055616.153:900): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.373431 kernel: audit: type=1400 audit(1734055616.199:901): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit: BPF prog-id=159 op=LOAD Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3676 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:56.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343063346537376434386439373039643962386165376136396364 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3676 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:56.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343063346537376434386439373039643962386165376136396364 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.199000 audit: BPF prog-id=160 op=LOAD Dec 13 02:06:56.199000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000210540 items=0 ppid=3676 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:56.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343063346537376434386439373039643962386165376136396364 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit: BPF prog-id=161 op=LOAD Dec 13 02:06:56.221000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000210588 items=0 ppid=3676 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:56.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343063346537376434386439373039643962386165376136396364 Dec 13 02:06:56.221000 audit: BPF prog-id=161 op=UNLOAD Dec 13 02:06:56.221000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:56.221000 audit: BPF prog-id=162 op=LOAD Dec 13 02:06:56.221000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000210998 items=0 ppid=3676 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:56.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343063346537376434386439373039643962386165376136396364 Dec 13 02:06:56.367000 audit[3758]: AVC avc: denied { search } for pid=3758 comm="rpcbind" name="crypto" dev="proc" ino=24305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:06:56.367000 audit[3758]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa8dd23f0c0 a2=0 a3=0 items=0 ppid=3742 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 key=(null) Dec 13 02:06:56.367000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 02:06:56.422000 audit[3763]: AVC avc: denied { search } for pid=3763 comm="dbus-daemon" name="crypto" dev="proc" ino=24305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:06:56.422000 audit[3763]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f39731170c0 a2=0 a3=0 items=0 ppid=3742 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 key=(null) Dec 13 02:06:56.422000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:06:56.427000 audit[3764]: AVC avc: denied { watch } for pid=3764 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538969 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c71,c86 tclass=dir permissive=0 Dec 13 02:06:56.427000 audit[3764]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55ef676e6940 a2=2c8 a3=7fff0082376c items=0 ppid=3742 pid=3764 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 key=(null) Dec 13 02:06:56.427000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:06:56.434000 audit[3765]: AVC avc: denied { read } for pid=3765 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24390 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 02:06:56.434000 audit[3765]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f6076b9d320 a1=80000 a2=d a3=7ffffe5bb410 items=0 ppid=3742 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 key=(null) Dec 13 02:06:56.434000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:06:56.435000 audit[3765]: AVC avc: denied { search } for pid=3765 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:06:56.435000 audit[3765]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f60760f10c0 a2=0 a3=0 items=0 ppid=3742 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c86 key=(null) Dec 13 02:06:56.435000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:06:56.801155 kubelet[1569]: E1213 02:06:56.801092 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:57.246599 kubelet[1569]: I1213 02:06:57.246518 1569 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.139889066 podStartE2EDuration="7.246493445s" podCreationTimestamp="2024-12-13 02:06:50 +0000 UTC" firstStartedPulling="2024-12-13 02:06:50.940157666 +0000 UTC m=+41.821985738" lastFinishedPulling="2024-12-13 02:06:56.046762028 +0000 UTC m=+46.928590117" observedRunningTime="2024-12-13 02:06:57.244622887 +0000 UTC m=+48.126450984" watchObservedRunningTime="2024-12-13 02:06:57.246493445 +0000 UTC m=+48.128321544" Dec 13 02:06:57.278000 audit[3770]: NETFILTER_CFG table=filter:82 family=2 entries=20 op=nft_register_rule pid=3770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:57.278000 audit[3770]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe667b37b0 a2=0 a3=7ffe667b379c items=0 ppid=1738 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:57.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:57.283000 audit[3770]: NETFILTER_CFG table=nat:83 family=2 entries=106 op=nft_register_chain pid=3770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:57.283000 audit[3770]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe667b37b0 a2=0 a3=7ffe667b379c items=0 ppid=1738 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:57.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:57.801946 kubelet[1569]: E1213 02:06:57.801892 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:58.802812 kubelet[1569]: E1213 02:06:58.802743 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:59.802960 kubelet[1569]: E1213 02:06:59.802888 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:00.804073 kubelet[1569]: E1213 02:07:00.804006 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:01.804541 kubelet[1569]: E1213 02:07:01.804470 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:02.805471 kubelet[1569]: E1213 02:07:02.805406 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:03.806554 kubelet[1569]: E1213 02:07:03.806485 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:04.807520 kubelet[1569]: E1213 02:07:04.807450 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:05.808514 kubelet[1569]: E1213 02:07:05.808464 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:06.809405 kubelet[1569]: E1213 02:07:06.809348 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:07.809749 kubelet[1569]: E1213 02:07:07.809696 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:08.810735 kubelet[1569]: E1213 02:07:08.810659 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:09.763665 kubelet[1569]: E1213 02:07:09.763591 1569 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:09.811928 kubelet[1569]: E1213 02:07:09.811863 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:09.828052 env[1220]: time="2024-12-13T02:07:09.827996344Z" level=info msg="StopPodSandbox for \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\"" Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.880 [WARNING][3809] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-csi--node--driver--9p8wk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"13181872-b83c-4024-b2db-b96f8866cd4f", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13", Pod:"csi-node-driver-9p8wk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic4d840d7771", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.880 [INFO][3809] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.880 [INFO][3809] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" iface="eth0" netns="" Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.881 [INFO][3809] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.881 [INFO][3809] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.910 [INFO][3815] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" HandleID="k8s-pod-network.eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.911 [INFO][3815] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.912 [INFO][3815] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.920 [WARNING][3815] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" HandleID="k8s-pod-network.eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.920 [INFO][3815] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" HandleID="k8s-pod-network.eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.922 [INFO][3815] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:09.925331 env[1220]: 2024-12-13 02:07:09.924 [INFO][3809] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:07:09.926089 env[1220]: time="2024-12-13T02:07:09.925783888Z" level=info msg="TearDown network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\" successfully" Dec 13 02:07:09.926089 env[1220]: time="2024-12-13T02:07:09.925834402Z" level=info msg="StopPodSandbox for \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\" returns successfully" Dec 13 02:07:09.926622 env[1220]: time="2024-12-13T02:07:09.926570010Z" level=info msg="RemovePodSandbox for \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\"" Dec 13 02:07:09.926791 env[1220]: time="2024-12-13T02:07:09.926626850Z" level=info msg="Forcibly stopping sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\"" Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:09.979 [WARNING][3834] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-csi--node--driver--9p8wk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"13181872-b83c-4024-b2db-b96f8866cd4f", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"48bc573dd8a4af44f986c8d5132f1906c0ace2ef5e52b21a77b150f8a37d6f13", Pod:"csi-node-driver-9p8wk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic4d840d7771", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:09.979 [INFO][3834] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:09.979 [INFO][3834] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" iface="eth0" netns="" Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:09.979 [INFO][3834] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:09.979 [INFO][3834] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:10.007 [INFO][3842] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" HandleID="k8s-pod-network.eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:10.007 [INFO][3842] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:10.007 [INFO][3842] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:10.014 [WARNING][3842] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" HandleID="k8s-pod-network.eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:10.014 [INFO][3842] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" HandleID="k8s-pod-network.eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Workload="10.128.0.29-k8s-csi--node--driver--9p8wk-eth0" Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:10.016 [INFO][3842] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:10.018958 env[1220]: 2024-12-13 02:07:10.017 [INFO][3834] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950" Dec 13 02:07:10.020581 env[1220]: time="2024-12-13T02:07:10.020491025Z" level=info msg="TearDown network for sandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\" successfully" Dec 13 02:07:10.026447 env[1220]: time="2024-12-13T02:07:10.026370094Z" level=info msg="RemovePodSandbox \"eb3d33b01b999c6103c6a118c7e3d44d83b02151fc3f9cccd459fa3f0bc88950\" returns successfully" Dec 13 02:07:10.027059 env[1220]: time="2024-12-13T02:07:10.027019295Z" level=info msg="StopPodSandbox for \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\"" Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.092 [WARNING][3862] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0", GenerateName:"calico-kube-controllers-6c9c6cdc4c-", Namespace:"calico-system", SelfLink:"", UID:"5bc10486-3a9c-4241-9d17-6cb8085e7bf2", ResourceVersion:"1268", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c9c6cdc4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754", Pod:"calico-kube-controllers-6c9c6cdc4c-t5kwn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali85f93727519", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.093 [INFO][3862] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.093 [INFO][3862] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" iface="eth0" netns="" Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.093 [INFO][3862] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.093 [INFO][3862] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.118 [INFO][3868] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" HandleID="k8s-pod-network.8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.119 [INFO][3868] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.119 [INFO][3868] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.126 [WARNING][3868] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" HandleID="k8s-pod-network.8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.126 [INFO][3868] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" HandleID="k8s-pod-network.8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.128 [INFO][3868] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:10.134573 env[1220]: 2024-12-13 02:07:10.133 [INFO][3862] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:07:10.135509 env[1220]: time="2024-12-13T02:07:10.134598073Z" level=info msg="TearDown network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\" successfully" Dec 13 02:07:10.135509 env[1220]: time="2024-12-13T02:07:10.134733467Z" level=info msg="StopPodSandbox for \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\" returns successfully" Dec 13 02:07:10.135509 env[1220]: time="2024-12-13T02:07:10.135407256Z" level=info msg="RemovePodSandbox for \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\"" Dec 13 02:07:10.135509 env[1220]: time="2024-12-13T02:07:10.135451654Z" level=info msg="Forcibly stopping sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\"" Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.182 [WARNING][3886] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0", GenerateName:"calico-kube-controllers-6c9c6cdc4c-", Namespace:"calico-system", SelfLink:"", UID:"5bc10486-3a9c-4241-9d17-6cb8085e7bf2", ResourceVersion:"1268", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c9c6cdc4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"c2396a7001a167e27fea793e74b902ea242a0137e91628a8f7070a4201804754", Pod:"calico-kube-controllers-6c9c6cdc4c-t5kwn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali85f93727519", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.183 [INFO][3886] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.183 [INFO][3886] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" iface="eth0" netns="" Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.183 [INFO][3886] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.183 [INFO][3886] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.217 [INFO][3892] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" HandleID="k8s-pod-network.8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.217 [INFO][3892] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.217 [INFO][3892] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.225 [WARNING][3892] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" HandleID="k8s-pod-network.8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.225 [INFO][3892] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" HandleID="k8s-pod-network.8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Workload="10.128.0.29-k8s-calico--kube--controllers--6c9c6cdc4c--t5kwn-eth0" Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.227 [INFO][3892] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:10.229394 env[1220]: 2024-12-13 02:07:10.228 [INFO][3886] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb" Dec 13 02:07:10.230341 env[1220]: time="2024-12-13T02:07:10.229502222Z" level=info msg="TearDown network for sandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\" successfully" Dec 13 02:07:10.233859 env[1220]: time="2024-12-13T02:07:10.233805291Z" level=info msg="RemovePodSandbox \"8973662712d2ca870286e0e74579f5e18b80f1cc7b995c875d913bef2c6e2cbb\" returns successfully" Dec 13 02:07:10.234831 env[1220]: time="2024-12-13T02:07:10.234788150Z" level=info msg="StopPodSandbox for \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\"" Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.287 [WARNING][3911] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"bd2ec361-43e4-4217-a0ff-5fd487160d13", ResourceVersion:"1256", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837", Pod:"nginx-deployment-85f456d6dd-kp89t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib1e278e5955", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.288 [INFO][3911] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.288 [INFO][3911] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" iface="eth0" netns="" Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.288 [INFO][3911] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.288 [INFO][3911] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.317 [INFO][3917] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" HandleID="k8s-pod-network.2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.317 [INFO][3917] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.317 [INFO][3917] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.325 [WARNING][3917] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" HandleID="k8s-pod-network.2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.325 [INFO][3917] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" HandleID="k8s-pod-network.2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.327 [INFO][3917] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:10.329794 env[1220]: 2024-12-13 02:07:10.328 [INFO][3911] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:07:10.330858 env[1220]: time="2024-12-13T02:07:10.330806635Z" level=info msg="TearDown network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\" successfully" Dec 13 02:07:10.331030 env[1220]: time="2024-12-13T02:07:10.331002712Z" level=info msg="StopPodSandbox for \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\" returns successfully" Dec 13 02:07:10.332476 env[1220]: time="2024-12-13T02:07:10.332434668Z" level=info msg="RemovePodSandbox for \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\"" Dec 13 02:07:10.332645 env[1220]: time="2024-12-13T02:07:10.332482982Z" level=info msg="Forcibly stopping sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\"" Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.378 [WARNING][3935] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"bd2ec361-43e4-4217-a0ff-5fd487160d13", ResourceVersion:"1256", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"803167a11c39121b901cb8e4a423e5f0083361be2dba3717d508c4270b45d837", Pod:"nginx-deployment-85f456d6dd-kp89t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib1e278e5955", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.378 [INFO][3935] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.378 [INFO][3935] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" iface="eth0" netns="" Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.378 [INFO][3935] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.378 [INFO][3935] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.404 [INFO][3942] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" HandleID="k8s-pod-network.2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.404 [INFO][3942] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.404 [INFO][3942] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.411 [WARNING][3942] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" HandleID="k8s-pod-network.2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.411 [INFO][3942] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" HandleID="k8s-pod-network.2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--kp89t-eth0" Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.413 [INFO][3942] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:10.415775 env[1220]: 2024-12-13 02:07:10.414 [INFO][3935] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0" Dec 13 02:07:10.415775 env[1220]: time="2024-12-13T02:07:10.415730728Z" level=info msg="TearDown network for sandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\" successfully" Dec 13 02:07:10.420110 env[1220]: time="2024-12-13T02:07:10.420047461Z" level=info msg="RemovePodSandbox \"2ded9ac052f24076830a9aa022626f33c7b9cf20c335b485bc51d472e8d389f0\" returns successfully" Dec 13 02:07:10.420962 env[1220]: time="2024-12-13T02:07:10.420922609Z" level=info msg="StopPodSandbox for \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\"" Dec 13 02:07:10.421312 env[1220]: time="2024-12-13T02:07:10.421236503Z" level=info msg="TearDown network for sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" successfully" Dec 13 02:07:10.421429 env[1220]: time="2024-12-13T02:07:10.421309274Z" level=info msg="StopPodSandbox for \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" returns successfully" Dec 13 02:07:10.421786 env[1220]: time="2024-12-13T02:07:10.421751456Z" level=info msg="RemovePodSandbox for \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\"" Dec 13 02:07:10.421906 env[1220]: time="2024-12-13T02:07:10.421790362Z" level=info msg="Forcibly stopping sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\"" Dec 13 02:07:10.421966 env[1220]: time="2024-12-13T02:07:10.421899851Z" level=info msg="TearDown network for sandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" successfully" Dec 13 02:07:10.426125 env[1220]: time="2024-12-13T02:07:10.426077067Z" level=info msg="RemovePodSandbox \"a1452613c6abdb723a346fef61b26ffc2edf990f7fe61d0d47883386bab9953e\" returns successfully" Dec 13 02:07:10.813065 kubelet[1569]: E1213 02:07:10.813012 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:11.813862 kubelet[1569]: E1213 02:07:11.813800 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:12.814538 kubelet[1569]: E1213 02:07:12.814461 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:13.815645 kubelet[1569]: E1213 02:07:13.815562 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:14.816142 kubelet[1569]: E1213 02:07:14.816070 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:15.816628 kubelet[1569]: E1213 02:07:15.816550 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:16.817572 kubelet[1569]: E1213 02:07:16.817505 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:17.701184 systemd[1]: run-containerd-runc-k8s.io-b633378c36a7d98c43393a41e0e64e38155bfbab512c395ba2d01b5deb74162f-runc.63Zksj.mount: Deactivated successfully. Dec 13 02:07:17.818438 kubelet[1569]: E1213 02:07:17.818385 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:18.819136 kubelet[1569]: E1213 02:07:18.819060 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:19.819789 kubelet[1569]: E1213 02:07:19.819714 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:20.181189 systemd[1]: run-containerd-runc-k8s.io-b3f4239d33f978d261e28fa95ce71942516fc26935a213e2abca8fcc6bd83494-runc.BEgnPQ.mount: Deactivated successfully. Dec 13 02:07:20.750881 kubelet[1569]: I1213 02:07:20.750825 1569 topology_manager.go:215] "Topology Admit Handler" podUID="7b11f421-7d31-49cc-b951-25bc175d0e20" podNamespace="default" podName="test-pod-1" Dec 13 02:07:20.758852 systemd[1]: Created slice kubepods-besteffort-pod7b11f421_7d31_49cc_b951_25bc175d0e20.slice. Dec 13 02:07:20.820982 kubelet[1569]: E1213 02:07:20.820920 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:20.886152 kubelet[1569]: I1213 02:07:20.886067 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-ba28876f-7df3-4777-9978-2e9836cffe05\" (UniqueName: \"kubernetes.io/nfs/7b11f421-7d31-49cc-b951-25bc175d0e20-pvc-ba28876f-7df3-4777-9978-2e9836cffe05\") pod \"test-pod-1\" (UID: \"7b11f421-7d31-49cc-b951-25bc175d0e20\") " pod="default/test-pod-1" Dec 13 02:07:20.886152 kubelet[1569]: I1213 02:07:20.886130 1569 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pb2ln\" (UniqueName: \"kubernetes.io/projected/7b11f421-7d31-49cc-b951-25bc175d0e20-kube-api-access-pb2ln\") pod \"test-pod-1\" (UID: \"7b11f421-7d31-49cc-b951-25bc175d0e20\") " pod="default/test-pod-1" Dec 13 02:07:21.023546 kernel: Failed to create system directory netfs Dec 13 02:07:21.023768 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 02:07:21.023825 kernel: audit: type=1400 audit(1734055641.015:917): avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.015000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.052031 kernel: Failed to create system directory netfs Dec 13 02:07:21.052198 kernel: audit: type=1400 audit(1734055641.015:917): avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.015000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.080159 kernel: Failed to create system directory netfs Dec 13 02:07:21.080323 kernel: audit: type=1400 audit(1734055641.015:917): avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.015000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.108386 kernel: Failed to create system directory netfs Dec 13 02:07:21.108561 kernel: audit: type=1400 audit(1734055641.015:917): avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.015000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.015000 audit[3998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625365f35e0 a1=153bc a2=56252741b2b0 a3=5 items=0 ppid=9 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:21.015000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:21.180944 kernel: audit: type=1300 audit(1734055641.015:917): arch=c000003e syscall=175 success=yes exit=0 a0=5625365f35e0 a1=153bc a2=56252741b2b0 a3=5 items=0 ppid=9 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:21.181125 kernel: audit: type=1327 audit(1734055641.015:917): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:21.186520 kernel: Failed to create system directory fscache Dec 13 02:07:21.186636 kernel: audit: type=1400 audit(1734055641.173:918): avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.215167 kernel: Failed to create system directory fscache Dec 13 02:07:21.215343 kernel: audit: type=1400 audit(1734055641.173:918): avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.238112 kernel: Failed to create system directory fscache Dec 13 02:07:21.266437 kernel: audit: type=1400 audit(1734055641.173:918): avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.266616 kernel: Failed to create system directory fscache Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.295458 kernel: audit: type=1400 audit(1734055641.173:918): avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.295651 kernel: Failed to create system directory fscache Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.314964 kernel: Failed to create system directory fscache Dec 13 02:07:21.315046 kernel: Failed to create system directory fscache Dec 13 02:07:21.315090 kernel: Failed to create system directory fscache Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.325479 kernel: Failed to create system directory fscache Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.330809 kernel: Failed to create system directory fscache Dec 13 02:07:21.330909 kernel: Failed to create system directory fscache Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.341255 kernel: Failed to create system directory fscache Dec 13 02:07:21.341342 kernel: Failed to create system directory fscache Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.173000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.351708 kernel: Failed to create system directory fscache Dec 13 02:07:21.173000 audit[3998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625368089c0 a1=4c0fc a2=56252741b2b0 a3=5 items=0 ppid=9 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:21.173000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:21.356730 kernel: FS-Cache: Loaded Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.411363 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.411494 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.416671 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.416829 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.426967 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.427072 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.437286 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.437407 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.447667 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.447835 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.457994 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.458115 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.468380 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.468511 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.478702 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.478813 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.488945 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.489045 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.499193 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.499284 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.509419 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.509484 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.519752 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.519893 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.530120 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.530282 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.540420 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.540559 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.550698 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.550852 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.560972 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.561118 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.571230 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.571363 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.581483 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.581603 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.591736 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.591877 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.602123 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.607363 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.607490 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.617737 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.617850 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.628038 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.633308 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.638535 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.638664 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.648938 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.649070 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.659305 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.659427 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.669627 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.669756 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.679878 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.679983 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.690168 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.690279 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.700608 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.700738 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.716173 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.716291 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.716329 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.726424 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.726517 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.736691 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.736810 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.746913 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.747022 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.757186 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.757275 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.767450 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.767556 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.777814 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.777920 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.788067 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.788188 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.798695 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.798834 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.809147 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.809288 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.819600 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.819754 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.822118 kubelet[1569]: E1213 02:07:21.822031 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.829888 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.830027 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.840145 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.840290 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.850483 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.850634 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.855740 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.866096 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.866215 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.876359 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.876476 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.886593 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.886721 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.891741 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.901981 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.902120 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.912231 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.912351 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.922444 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.922586 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.932728 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.932855 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.943050 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.943186 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.953378 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.953515 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.963690 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.963809 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.971035 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.974407 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.984439 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.984544 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.994729 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.994844 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.005204 kernel: Failed to create system directory sunrpc Dec 13 02:07:22.005287 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.010333 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.020669 kernel: Failed to create system directory sunrpc Dec 13 02:07:22.020784 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.036572 kernel: Failed to create system directory sunrpc Dec 13 02:07:22.036734 kernel: Failed to create system directory sunrpc Dec 13 02:07:22.036803 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.046801 kernel: Failed to create system directory sunrpc Dec 13 02:07:22.046918 kernel: Failed to create system directory sunrpc Dec 13 02:07:21.387000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.072146 kernel: RPC: Registered named UNIX socket transport module. Dec 13 02:07:22.072320 kernel: RPC: Registered udp transport module. Dec 13 02:07:22.072368 kernel: RPC: Registered tcp transport module. Dec 13 02:07:22.076868 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 02:07:21.387000 audit[3998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562536854ad0 a1=1a7f1c a2=56252741b2b0 a3=5 items=6 ppid=9 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:21.387000 audit: CWD cwd="/" Dec 13 02:07:21.387000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:21.387000 audit: PATH item=1 name=(null) inode=26250 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:21.387000 audit: PATH item=2 name=(null) inode=26250 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:21.387000 audit: PATH item=3 name=(null) inode=26251 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:21.387000 audit: PATH item=4 name=(null) inode=26250 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:21.387000 audit: PATH item=5 name=(null) inode=26252 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:21.387000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.142705 kernel: Failed to create system directory nfs Dec 13 02:07:22.142856 kernel: Failed to create system directory nfs Dec 13 02:07:22.142900 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.152612 kernel: Failed to create system directory nfs Dec 13 02:07:22.152767 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.162338 kernel: Failed to create system directory nfs Dec 13 02:07:22.162488 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.167274 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.172123 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.177206 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.182032 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.186928 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.191867 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.196893 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.201740 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.206738 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.211620 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.216640 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.221448 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.226347 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.231282 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.236198 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.241022 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.247715 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.255779 kernel: Failed to create system directory nfs Dec 13 02:07:22.255857 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.261792 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.270725 kernel: Failed to create system directory nfs Dec 13 02:07:22.270844 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.280454 kernel: Failed to create system directory nfs Dec 13 02:07:22.280560 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.290170 kernel: Failed to create system directory nfs Dec 13 02:07:22.290311 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.300351 kernel: Failed to create system directory nfs Dec 13 02:07:22.300463 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.306706 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.310171 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.319955 kernel: Failed to create system directory nfs Dec 13 02:07:22.320048 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.334705 kernel: Failed to create system directory nfs Dec 13 02:07:22.334836 kernel: Failed to create system directory nfs Dec 13 02:07:22.334916 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.344456 kernel: Failed to create system directory nfs Dec 13 02:07:22.344570 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.354169 kernel: Failed to create system directory nfs Dec 13 02:07:22.354281 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.364000 kernel: Failed to create system directory nfs Dec 13 02:07:22.364114 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.373720 kernel: Failed to create system directory nfs Dec 13 02:07:22.373871 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.378810 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.383761 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.393530 kernel: Failed to create system directory nfs Dec 13 02:07:22.393715 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.403240 kernel: Failed to create system directory nfs Dec 13 02:07:22.403371 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.412993 kernel: Failed to create system directory nfs Dec 13 02:07:22.413159 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.422774 kernel: Failed to create system directory nfs Dec 13 02:07:22.422916 kernel: Failed to create system directory nfs Dec 13 02:07:22.122000 audit[3998]: AVC avc: denied { confidentiality } for pid=3998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.460361 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 02:07:22.122000 audit[3998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562536a75700 a1=16e97c a2=56252741b2b0 a3=5 items=0 ppid=9 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:22.122000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.526528 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.526660 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.526726 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.536482 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.536586 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.546546 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.557332 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.557443 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.557482 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.562721 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.572209 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.582874 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.582967 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.583021 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.593427 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.593563 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.603829 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.603958 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.614026 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.614180 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.623960 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.624096 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.633968 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.634126 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.639261 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.649312 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.649531 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.660725 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.660789 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.665802 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.674997 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.675150 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.680038 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.690052 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.690195 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.694986 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.699885 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.704884 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.709803 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.714800 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.719705 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.724699 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.729669 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.739773 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.739875 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.751114 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.751255 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.759757 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.759914 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.765745 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.770845 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.780183 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.780280 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.790112 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.790202 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.800349 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.800478 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.810335 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.810442 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.820270 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.820361 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.822876 kubelet[1569]: E1213 02:07:22.822760 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:22.825322 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.835193 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.835301 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.845191 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.845297 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.855182 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.855297 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.865329 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.865462 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.875323 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.875436 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.885235 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.885390 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.895675 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.895918 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.905918 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.906024 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.920767 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.920922 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.921009 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.930579 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.930731 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.935673 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.945660 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.945802 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.955550 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.955669 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.965487 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.965563 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.975380 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.975462 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:22.985274 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.985361 kernel: Failed to create system directory nfs4 Dec 13 02:07:22.500000 audit[4003]: AVC avc: denied { confidentiality } for pid=4003 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.167955 kernel: NFS: Registering the id_resolver key type Dec 13 02:07:23.168156 kernel: Key type id_resolver registered Dec 13 02:07:23.168224 kernel: Key type id_legacy registered Dec 13 02:07:22.500000 audit[4003]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fcce0348010 a1=208de4 a2=55bf7588a2b0 a3=5 items=0 ppid=9 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:22.500000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.199575 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.199725 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.199766 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.209814 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.209915 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.220130 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.220236 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.236658 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.236791 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.236827 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.245983 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.246115 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.251722 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.261501 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.261586 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.272715 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.272770 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.282258 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.282357 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.292532 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.292636 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.302831 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.302911 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.313278 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.313428 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.185000 audit[4006]: AVC avc: denied { confidentiality } for pid=4006 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:23.323545 kernel: Failed to create system directory rpcgss Dec 13 02:07:23.185000 audit[4006]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f0e13cc9010 a1=70af4 a2=559780cee2b0 a3=5 items=0 ppid=9 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.185000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 02:07:23.363193 nfsidmap[4014]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 02:07:23.375087 nfsidmap[4015]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 02:07:23.389000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:23.389000 audit[1304]: AVC avc: denied { watch_reads } for pid=1304 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:23.389000 audit[1304]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f27d287040 a2=10 a3=72f3096b7f0b237b items=0 ppid=1 pid=1304 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.389000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:07:23.390000 audit[1304]: AVC avc: denied { watch_reads } for pid=1304 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:23.390000 audit[1304]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f27d287040 a2=10 a3=72f3096b7f0b237b items=0 ppid=1 pid=1304 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.390000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:07:23.390000 audit[1304]: AVC avc: denied { watch_reads } for pid=1304 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:23.390000 audit[1304]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f27d287040 a2=10 a3=72f3096b7f0b237b items=0 ppid=1 pid=1304 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.390000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:07:23.390000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:23.390000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:23.464845 env[1220]: time="2024-12-13T02:07:23.464661998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:7b11f421-7d31-49cc-b951-25bc175d0e20,Namespace:default,Attempt:0,}" Dec 13 02:07:23.643156 systemd-networkd[1029]: cali5ec59c6bf6e: Link UP Dec 13 02:07:23.661486 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:07:23.661632 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 02:07:23.661021 systemd-networkd[1029]: cali5ec59c6bf6e: Gained carrier Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.532 [INFO][4016] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.29-k8s-test--pod--1-eth0 default 7b11f421-7d31-49cc-b951-25bc175d0e20 1392 0 2024-12-13 02:06:51 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.29 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.532 [INFO][4016] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.565 [INFO][4027] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" HandleID="k8s-pod-network.c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Workload="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.578 [INFO][4027] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" HandleID="k8s-pod-network.c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Workload="10.128.0.29-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292ae0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.29", "pod":"test-pod-1", "timestamp":"2024-12-13 02:07:23.565314695 +0000 UTC"}, Hostname:"10.128.0.29", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.578 [INFO][4027] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.578 [INFO][4027] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.578 [INFO][4027] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.29' Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.580 [INFO][4027] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" host="10.128.0.29" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.585 [INFO][4027] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.29" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.590 [INFO][4027] ipam/ipam.go 489: Trying affinity for 192.168.125.128/26 host="10.128.0.29" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.593 [INFO][4027] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.596 [INFO][4027] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.596 [INFO][4027] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" host="10.128.0.29" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.598 [INFO][4027] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.605 [INFO][4027] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" host="10.128.0.29" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.624 [INFO][4027] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.133/26] block=192.168.125.128/26 handle="k8s-pod-network.c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" host="10.128.0.29" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.625 [INFO][4027] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.133/26] handle="k8s-pod-network.c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" host="10.128.0.29" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.625 [INFO][4027] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.625 [INFO][4027] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.133/26] IPv6=[] ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" HandleID="k8s-pod-network.c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Workload="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 02:07:23.682335 env[1220]: 2024-12-13 02:07:23.636 [INFO][4016] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"7b11f421-7d31-49cc-b951-25bc175d0e20", ResourceVersion:"1392", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:23.683950 env[1220]: 2024-12-13 02:07:23.636 [INFO][4016] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.133/32] ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 02:07:23.683950 env[1220]: 2024-12-13 02:07:23.636 [INFO][4016] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 02:07:23.683950 env[1220]: 2024-12-13 02:07:23.659 [INFO][4016] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 02:07:23.683950 env[1220]: 2024-12-13 02:07:23.660 [INFO][4016] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"7b11f421-7d31-49cc-b951-25bc175d0e20", ResourceVersion:"1392", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"22:b6:6c:49:4f:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:23.683950 env[1220]: 2024-12-13 02:07:23.678 [INFO][4016] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 02:07:23.710328 env[1220]: time="2024-12-13T02:07:23.710191938Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:07:23.710328 env[1220]: time="2024-12-13T02:07:23.710249370Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:07:23.710328 env[1220]: time="2024-12-13T02:07:23.710268689Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:07:23.710726 env[1220]: time="2024-12-13T02:07:23.710529092Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee pid=4058 runtime=io.containerd.runc.v2 Dec 13 02:07:23.714000 audit[4052]: NETFILTER_CFG table=filter:84 family=2 entries=42 op=nft_register_chain pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:07:23.714000 audit[4052]: SYSCALL arch=c000003e syscall=46 success=yes exit=20588 a0=3 a1=7ffe42b53370 a2=0 a3=7ffe42b5335c items=0 ppid=3193 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.714000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:07:23.740908 systemd[1]: Started cri-containerd-c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee.scope. Dec 13 02:07:23.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.768000 audit: BPF prog-id=163 op=LOAD Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4058 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623264336135323634626637376334633362396137343733303065 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4058 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623264336135323634626637376334633362396137343733303065 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit: BPF prog-id=164 op=LOAD Dec 13 02:07:23.769000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00035c510 items=0 ppid=4058 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623264336135323634626637376334633362396137343733303065 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit: BPF prog-id=165 op=LOAD Dec 13 02:07:23.769000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00035c558 items=0 ppid=4058 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623264336135323634626637376334633362396137343733303065 Dec 13 02:07:23.769000 audit: BPF prog-id=165 op=UNLOAD Dec 13 02:07:23.769000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:23.769000 audit: BPF prog-id=166 op=LOAD Dec 13 02:07:23.769000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00035c968 items=0 ppid=4058 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:23.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623264336135323634626637376334633362396137343733303065 Dec 13 02:07:23.810503 env[1220]: time="2024-12-13T02:07:23.810448476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:7b11f421-7d31-49cc-b951-25bc175d0e20,Namespace:default,Attempt:0,} returns sandbox id \"c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee\"" Dec 13 02:07:23.813185 env[1220]: time="2024-12-13T02:07:23.813145136Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:07:23.825849 kubelet[1569]: E1213 02:07:23.825767 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:24.031519 env[1220]: time="2024-12-13T02:07:24.029187578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:07:24.034291 env[1220]: time="2024-12-13T02:07:24.034223322Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:07:24.036765 env[1220]: time="2024-12-13T02:07:24.036723352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:07:24.039596 env[1220]: time="2024-12-13T02:07:24.039550627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:07:24.040632 env[1220]: time="2024-12-13T02:07:24.040536035Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:07:24.044349 env[1220]: time="2024-12-13T02:07:24.044292350Z" level=info msg="CreateContainer within sandbox \"c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 02:07:24.067020 env[1220]: time="2024-12-13T02:07:24.066947973Z" level=info msg="CreateContainer within sandbox \"c8b2d3a5264bf77c4c3b9a747300e676c4beb1b824ef1e9189ae7ff4e92177ee\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"08760e78f15271217244deee192348d15539e196b7b9e55c295f37d42c9581b1\"" Dec 13 02:07:24.068026 env[1220]: time="2024-12-13T02:07:24.067956836Z" level=info msg="StartContainer for \"08760e78f15271217244deee192348d15539e196b7b9e55c295f37d42c9581b1\"" Dec 13 02:07:24.092017 systemd[1]: Started cri-containerd-08760e78f15271217244deee192348d15539e196b7b9e55c295f37d42c9581b1.scope. Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.111000 audit: BPF prog-id=167 op=LOAD Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4058 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038373630653738663135323731323137323434646565653139323334 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4058 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038373630653738663135323731323137323434646565653139323334 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit: BPF prog-id=168 op=LOAD Dec 13 02:07:24.113000 audit[4098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028a370 items=0 ppid=4058 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038373630653738663135323731323137323434646565653139323334 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit: BPF prog-id=169 op=LOAD Dec 13 02:07:24.113000 audit[4098]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028a3b8 items=0 ppid=4058 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038373630653738663135323731323137323434646565653139323334 Dec 13 02:07:24.113000 audit: BPF prog-id=169 op=UNLOAD Dec 13 02:07:24.113000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:24.113000 audit: BPF prog-id=170 op=LOAD Dec 13 02:07:24.113000 audit[4098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028a7c8 items=0 ppid=4058 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038373630653738663135323731323137323434646565653139323334 Dec 13 02:07:24.145950 env[1220]: time="2024-12-13T02:07:24.145655139Z" level=info msg="StartContainer for \"08760e78f15271217244deee192348d15539e196b7b9e55c295f37d42c9581b1\" returns successfully" Dec 13 02:07:24.327411 kubelet[1569]: I1213 02:07:24.327215 1569 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=33.097111343 podStartE2EDuration="33.327142181s" podCreationTimestamp="2024-12-13 02:06:51 +0000 UTC" firstStartedPulling="2024-12-13 02:07:23.812457205 +0000 UTC m=+74.694285283" lastFinishedPulling="2024-12-13 02:07:24.042488028 +0000 UTC m=+74.924316121" observedRunningTime="2024-12-13 02:07:24.326429964 +0000 UTC m=+75.208258063" watchObservedRunningTime="2024-12-13 02:07:24.327142181 +0000 UTC m=+75.208970280" Dec 13 02:07:24.826201 kubelet[1569]: E1213 02:07:24.826108 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:25.429196 systemd-networkd[1029]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 02:07:25.828150 kubelet[1569]: E1213 02:07:25.827984 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:26.828341 kubelet[1569]: E1213 02:07:26.828261 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:27.828632 kubelet[1569]: E1213 02:07:27.828561 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:28.829464 kubelet[1569]: E1213 02:07:28.829395 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:29.763715 kubelet[1569]: E1213 02:07:29.763644 1569 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:29.829939 kubelet[1569]: E1213 02:07:29.829875 1569 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"