Dec 13 14:21:38.111498 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:21:38.111539 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:21:38.111557 kernel: BIOS-provided physical RAM map: Dec 13 14:21:38.111570 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 14:21:38.111582 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 14:21:38.111595 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 14:21:38.111612 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 14:21:38.111626 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 14:21:38.111638 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 14:21:38.111650 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 14:21:38.111663 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 14:21:38.111675 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 14:21:38.111688 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 14:21:38.111702 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 14:21:38.111722 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 14:21:38.111736 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 14:21:38.111750 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 14:21:38.111764 kernel: NX (Execute Disable) protection: active Dec 13 14:21:38.111779 kernel: efi: EFI v2.70 by EDK II Dec 13 14:21:38.111794 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 14:21:38.111808 kernel: random: crng init done Dec 13 14:21:38.111821 kernel: SMBIOS 2.4 present. Dec 13 14:21:38.111840 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 14:21:38.111854 kernel: Hypervisor detected: KVM Dec 13 14:21:38.111868 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:21:38.111882 kernel: kvm-clock: cpu 0, msr 11419a001, primary cpu clock Dec 13 14:21:38.111897 kernel: kvm-clock: using sched offset of 13086313087 cycles Dec 13 14:21:38.111912 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:21:38.111927 kernel: tsc: Detected 2299.998 MHz processor Dec 13 14:21:38.111942 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:21:38.111957 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:21:38.111972 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 14:21:38.111990 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:21:38.112003 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 14:21:38.112018 kernel: Using GB pages for direct mapping Dec 13 14:21:38.112033 kernel: Secure boot disabled Dec 13 14:21:38.112047 kernel: ACPI: Early table checksum verification disabled Dec 13 14:21:38.112063 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 14:21:38.112078 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 14:21:38.112093 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 14:21:38.112119 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 14:21:38.112135 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 14:21:38.112150 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 14:21:38.112166 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 14:21:38.112182 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 14:21:38.112198 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 14:21:38.112218 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 14:21:38.112234 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 14:21:38.113321 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 14:21:38.113339 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 14:21:38.113356 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 14:21:38.113372 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 14:21:38.113387 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 14:21:38.113404 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 14:21:38.113419 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 14:21:38.113442 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 14:21:38.113458 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 14:21:38.113483 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:21:38.113499 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:21:38.113515 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:21:38.113530 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 14:21:38.113547 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 14:21:38.113563 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 14:21:38.113580 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 14:21:38.113600 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Dec 13 14:21:38.113616 kernel: Zone ranges: Dec 13 14:21:38.113638 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:21:38.113655 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:21:38.113670 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:21:38.113686 kernel: Movable zone start for each node Dec 13 14:21:38.113701 kernel: Early memory node ranges Dec 13 14:21:38.113716 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 14:21:38.113732 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 14:21:38.113751 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 14:21:38.113767 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 14:21:38.113783 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 14:21:38.113798 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:21:38.113814 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 14:21:38.113829 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:21:38.113846 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 14:21:38.113863 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 14:21:38.113879 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 14:21:38.113900 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 14:21:38.113916 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 14:21:38.113931 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:21:38.113946 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:21:38.113962 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:21:38.113977 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:21:38.113993 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:21:38.114009 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:21:38.114025 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:21:38.114045 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:21:38.114060 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:21:38.114076 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:21:38.114092 kernel: Booting paravirtualized kernel on KVM Dec 13 14:21:38.114107 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:21:38.114123 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:21:38.114139 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:21:38.114155 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:21:38.114170 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:21:38.114189 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:21:38.114205 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:21:38.114221 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 14:21:38.114252 kernel: Policy zone: Normal Dec 13 14:21:38.116359 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:21:38.116382 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:21:38.116398 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:21:38.116415 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:21:38.116431 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:21:38.116452 kernel: Memory: 7515408K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 344876K reserved, 0K cma-reserved) Dec 13 14:21:38.116469 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:21:38.116494 kernel: Kernel/User page tables isolation: enabled Dec 13 14:21:38.116510 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:21:38.116526 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:21:38.116541 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:21:38.116558 kernel: rcu: RCU event tracing is enabled. Dec 13 14:21:38.116574 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:21:38.116596 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:21:38.116623 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:21:38.116641 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:21:38.116662 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:21:38.116680 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:21:38.116695 kernel: Console: colour dummy device 80x25 Dec 13 14:21:38.116711 kernel: printk: console [ttyS0] enabled Dec 13 14:21:38.116726 kernel: ACPI: Core revision 20210730 Dec 13 14:21:38.116742 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:21:38.116758 kernel: x2apic enabled Dec 13 14:21:38.116778 kernel: Switched APIC routing to physical x2apic. Dec 13 14:21:38.116795 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 14:21:38.116811 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:21:38.116829 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 14:21:38.116847 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 14:21:38.116864 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 14:21:38.116880 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:21:38.116901 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:21:38.116917 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:21:38.116934 kernel: Spectre V2 : Mitigation: IBRS Dec 13 14:21:38.116952 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:21:38.116970 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:21:38.116987 kernel: RETBleed: Mitigation: IBRS Dec 13 14:21:38.117005 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:21:38.117023 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 14:21:38.117041 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:21:38.117063 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 14:21:38.117080 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:21:38.117098 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:21:38.117116 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:21:38.117131 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:21:38.117146 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:21:38.117161 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:21:38.117176 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:21:38.117190 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:21:38.117210 kernel: LSM: Security Framework initializing Dec 13 14:21:38.117225 kernel: SELinux: Initializing. Dec 13 14:21:38.117258 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:21:38.117281 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:21:38.117296 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 14:21:38.117311 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 14:21:38.117327 kernel: signal: max sigframe size: 1776 Dec 13 14:21:38.117343 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:21:38.117360 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:21:38.117381 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:21:38.117398 kernel: x86: Booting SMP configuration: Dec 13 14:21:38.117415 kernel: .... node #0, CPUs: #1 Dec 13 14:21:38.117432 kernel: kvm-clock: cpu 1, msr 11419a041, secondary cpu clock Dec 13 14:21:38.117450 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:21:38.117468 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:21:38.117494 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:21:38.117510 kernel: smpboot: Max logical packages: 1 Dec 13 14:21:38.117530 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 14:21:38.117547 kernel: devtmpfs: initialized Dec 13 14:21:38.117563 kernel: x86/mm: Memory block size: 128MB Dec 13 14:21:38.117582 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 14:21:38.117599 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:21:38.117615 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:21:38.117632 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:21:38.117649 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:21:38.117667 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:21:38.117687 kernel: audit: type=2000 audit(1734099696.709:1): state=initialized audit_enabled=0 res=1 Dec 13 14:21:38.117704 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:21:38.117721 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:21:38.117737 kernel: cpuidle: using governor menu Dec 13 14:21:38.117754 kernel: ACPI: bus type PCI registered Dec 13 14:21:38.117771 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:21:38.117787 kernel: dca service started, version 1.12.1 Dec 13 14:21:38.117805 kernel: PCI: Using configuration type 1 for base access Dec 13 14:21:38.117822 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:21:38.117842 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:21:38.117859 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:21:38.117875 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:21:38.117892 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:21:38.117908 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:21:38.117925 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:21:38.117942 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:21:38.117958 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:21:38.117975 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:21:38.117995 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:21:38.118012 kernel: ACPI: Interpreter enabled Dec 13 14:21:38.118029 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:21:38.118045 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:21:38.118062 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:21:38.118079 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:21:38.118096 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:21:38.118349 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:21:38.118527 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:21:38.118549 kernel: PCI host bridge to bus 0000:00 Dec 13 14:21:38.118707 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:21:38.118852 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:21:38.118994 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:21:38.119134 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 14:21:38.119326 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:21:38.119512 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:21:38.119684 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 14:21:38.119855 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:21:38.120013 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:21:38.120189 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 14:21:38.120360 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 14:21:38.120533 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 14:21:38.120710 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:21:38.124409 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 14:21:38.124623 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 14:21:38.124806 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:21:38.124977 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 14:21:38.125144 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 14:21:38.125173 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:21:38.125191 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:21:38.125208 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:21:38.125224 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:21:38.125256 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:21:38.125273 kernel: iommu: Default domain type: Translated Dec 13 14:21:38.125291 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:21:38.125308 kernel: vgaarb: loaded Dec 13 14:21:38.125325 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:21:38.125346 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:21:38.125363 kernel: PTP clock support registered Dec 13 14:21:38.125380 kernel: Registered efivars operations Dec 13 14:21:38.125397 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:21:38.125414 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:21:38.125430 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 14:21:38.125447 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 14:21:38.125464 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 14:21:38.125487 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 14:21:38.125507 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 14:21:38.125524 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:21:38.125541 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:21:38.125558 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:21:38.125574 kernel: pnp: PnP ACPI init Dec 13 14:21:38.125591 kernel: pnp: PnP ACPI: found 7 devices Dec 13 14:21:38.125609 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:21:38.125625 kernel: NET: Registered PF_INET protocol family Dec 13 14:21:38.125642 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:21:38.125663 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:21:38.125680 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:21:38.125696 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:21:38.125713 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:21:38.125731 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:21:38.125748 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:21:38.125765 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:21:38.125782 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:21:38.125802 kernel: NET: Registered PF_XDP protocol family Dec 13 14:21:38.125965 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:21:38.126119 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:21:38.126286 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:21:38.126461 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 14:21:38.126643 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:21:38.126665 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:21:38.126687 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:21:38.126704 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 14:21:38.126721 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:21:38.126738 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:21:38.126755 kernel: clocksource: Switched to clocksource tsc Dec 13 14:21:38.126772 kernel: Initialise system trusted keyrings Dec 13 14:21:38.126788 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:21:38.126805 kernel: Key type asymmetric registered Dec 13 14:21:38.126822 kernel: Asymmetric key parser 'x509' registered Dec 13 14:21:38.126842 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:21:38.126859 kernel: io scheduler mq-deadline registered Dec 13 14:21:38.126876 kernel: io scheduler kyber registered Dec 13 14:21:38.126892 kernel: io scheduler bfq registered Dec 13 14:21:38.126909 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:21:38.126927 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:21:38.130354 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 14:21:38.130393 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 14:21:38.130586 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 14:21:38.130617 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:21:38.130780 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 14:21:38.130802 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:21:38.130820 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:21:38.130837 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:21:38.130853 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 14:21:38.130869 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 14:21:38.131033 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 14:21:38.131061 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:21:38.131079 kernel: i8042: Warning: Keylock active Dec 13 14:21:38.131095 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:21:38.131113 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:21:38.131286 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:21:38.131433 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:21:38.131586 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:21:37 UTC (1734099697) Dec 13 14:21:38.131731 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:21:38.131756 kernel: intel_pstate: CPU model not supported Dec 13 14:21:38.131772 kernel: pstore: Registered efi as persistent store backend Dec 13 14:21:38.131789 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:21:38.131806 kernel: Segment Routing with IPv6 Dec 13 14:21:38.131823 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:21:38.131840 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:21:38.131857 kernel: Key type dns_resolver registered Dec 13 14:21:38.131873 kernel: IPI shorthand broadcast: enabled Dec 13 14:21:38.131890 kernel: sched_clock: Marking stable (719318654, 139158771)->(899800667, -41323242) Dec 13 14:21:38.131911 kernel: registered taskstats version 1 Dec 13 14:21:38.131927 kernel: Loading compiled-in X.509 certificates Dec 13 14:21:38.131944 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:21:38.131962 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:21:38.131978 kernel: Key type .fscrypt registered Dec 13 14:21:38.131995 kernel: Key type fscrypt-provisioning registered Dec 13 14:21:38.132012 kernel: pstore: Using crash dump compression: deflate Dec 13 14:21:38.132028 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:21:38.132045 kernel: ima: No architecture policies found Dec 13 14:21:38.132065 kernel: clk: Disabling unused clocks Dec 13 14:21:38.132082 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:21:38.132099 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:21:38.132115 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:21:38.132131 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:21:38.132148 kernel: Run /init as init process Dec 13 14:21:38.132165 kernel: with arguments: Dec 13 14:21:38.132182 kernel: /init Dec 13 14:21:38.132198 kernel: with environment: Dec 13 14:21:38.132217 kernel: HOME=/ Dec 13 14:21:38.132233 kernel: TERM=linux Dec 13 14:21:38.132263 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:21:38.132283 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:21:38.132304 systemd[1]: Detected virtualization kvm. Dec 13 14:21:38.132322 systemd[1]: Detected architecture x86-64. Dec 13 14:21:38.132347 systemd[1]: Running in initrd. Dec 13 14:21:38.132368 systemd[1]: No hostname configured, using default hostname. Dec 13 14:21:38.132385 systemd[1]: Hostname set to . Dec 13 14:21:38.132404 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:21:38.132421 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:21:38.132439 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:21:38.132457 systemd[1]: Reached target cryptsetup.target. Dec 13 14:21:38.132480 systemd[1]: Reached target paths.target. Dec 13 14:21:38.132497 systemd[1]: Reached target slices.target. Dec 13 14:21:38.132518 systemd[1]: Reached target swap.target. Dec 13 14:21:38.132535 systemd[1]: Reached target timers.target. Dec 13 14:21:38.132554 systemd[1]: Listening on iscsid.socket. Dec 13 14:21:38.132572 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:21:38.132590 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:21:38.132607 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:21:38.132625 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:21:38.132643 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:21:38.132664 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:21:38.132683 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:21:38.132719 systemd[1]: Reached target sockets.target. Dec 13 14:21:38.132741 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:21:38.132759 systemd[1]: Finished network-cleanup.service. Dec 13 14:21:38.132778 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:21:38.132796 systemd[1]: Starting systemd-journald.service... Dec 13 14:21:38.132818 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:21:38.132836 kernel: audit: type=1334 audit(1734099698.098:2): prog-id=6 op=LOAD Dec 13 14:21:38.132853 systemd[1]: Starting systemd-resolved.service... Dec 13 14:21:38.132872 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:21:38.132890 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:21:38.132910 kernel: audit: type=1130 audit(1734099698.116:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.132927 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:21:38.132946 kernel: audit: type=1130 audit(1734099698.128:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.132981 systemd-journald[190]: Journal started Dec 13 14:21:38.133064 systemd-journald[190]: Runtime Journal (/run/log/journal/974c9488a37b48ce809ad8417b1d526f) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:21:38.098000 audit: BPF prog-id=6 op=LOAD Dec 13 14:21:38.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.144269 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:21:38.144337 systemd[1]: Started systemd-journald.service. Dec 13 14:21:38.144364 kernel: audit: type=1130 audit(1734099698.134:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.141189 systemd-modules-load[191]: Inserted module 'overlay' Dec 13 14:21:38.151406 kernel: audit: type=1130 audit(1734099698.142:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.145059 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:21:38.157251 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:21:38.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.179622 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:21:38.184309 kernel: audit: type=1130 audit(1734099698.178:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.193599 systemd-resolved[192]: Positive Trust Anchors: Dec 13 14:21:38.194322 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:21:38.194626 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:21:38.198664 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:21:38.206454 kernel: audit: type=1130 audit(1734099698.201:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.201798 systemd-resolved[192]: Defaulting to hostname 'linux'. Dec 13 14:21:38.205957 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:21:38.225550 dracut-cmdline[206]: dracut-dracut-053 Dec 13 14:21:38.248401 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:21:38.248451 kernel: audit: type=1130 audit(1734099698.235:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.248476 kernel: Bridge firewalling registered Dec 13 14:21:38.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.248562 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:21:38.229710 systemd[1]: Started systemd-resolved.service. Dec 13 14:21:38.236651 systemd[1]: Reached target nss-lookup.target. Dec 13 14:21:38.243853 systemd-modules-load[191]: Inserted module 'br_netfilter' Dec 13 14:21:38.281272 kernel: SCSI subsystem initialized Dec 13 14:21:38.299266 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:21:38.301479 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:21:38.301547 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:21:38.307102 systemd-modules-load[191]: Inserted module 'dm_multipath' Dec 13 14:21:38.308767 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:21:38.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.320636 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:21:38.334966 kernel: audit: type=1130 audit(1734099698.318:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.335005 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:21:38.333572 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:21:38.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.357264 kernel: iscsi: registered transport (tcp) Dec 13 14:21:38.384433 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:21:38.384543 kernel: QLogic iSCSI HBA Driver Dec 13 14:21:38.430745 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:21:38.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.432637 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:21:38.491312 kernel: raid6: avx2x4 gen() 18077 MB/s Dec 13 14:21:38.508287 kernel: raid6: avx2x4 xor() 7979 MB/s Dec 13 14:21:38.525281 kernel: raid6: avx2x2 gen() 18244 MB/s Dec 13 14:21:38.542284 kernel: raid6: avx2x2 xor() 18566 MB/s Dec 13 14:21:38.559289 kernel: raid6: avx2x1 gen() 14201 MB/s Dec 13 14:21:38.576314 kernel: raid6: avx2x1 xor() 16138 MB/s Dec 13 14:21:38.593304 kernel: raid6: sse2x4 gen() 10967 MB/s Dec 13 14:21:38.610283 kernel: raid6: sse2x4 xor() 6612 MB/s Dec 13 14:21:38.627282 kernel: raid6: sse2x2 gen() 11982 MB/s Dec 13 14:21:38.644277 kernel: raid6: sse2x2 xor() 7426 MB/s Dec 13 14:21:38.661269 kernel: raid6: sse2x1 gen() 10558 MB/s Dec 13 14:21:38.678868 kernel: raid6: sse2x1 xor() 5178 MB/s Dec 13 14:21:38.678915 kernel: raid6: using algorithm avx2x2 gen() 18244 MB/s Dec 13 14:21:38.678953 kernel: raid6: .... xor() 18566 MB/s, rmw enabled Dec 13 14:21:38.679674 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:21:38.695288 kernel: xor: automatically using best checksumming function avx Dec 13 14:21:38.801277 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:21:38.813389 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:21:38.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.817000 audit: BPF prog-id=7 op=LOAD Dec 13 14:21:38.817000 audit: BPF prog-id=8 op=LOAD Dec 13 14:21:38.819136 systemd[1]: Starting systemd-udevd.service... Dec 13 14:21:38.836588 systemd-udevd[389]: Using default interface naming scheme 'v252'. Dec 13 14:21:38.843733 systemd[1]: Started systemd-udevd.service. Dec 13 14:21:38.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.848310 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:21:38.867540 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Dec 13 14:21:38.905604 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:21:38.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:38.906993 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:21:38.973401 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:21:38.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:39.053270 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:21:39.167708 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:21:39.167803 kernel: scsi host0: Virtio SCSI HBA Dec 13 14:21:39.167865 kernel: AES CTR mode by8 optimization enabled Dec 13 14:21:39.190336 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 14:21:39.254275 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 14:21:39.312086 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 14:21:39.312327 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 14:21:39.312513 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 14:21:39.312655 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 14:21:39.312789 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:21:39.312806 kernel: GPT:17805311 != 25165823 Dec 13 14:21:39.312819 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:21:39.312832 kernel: GPT:17805311 != 25165823 Dec 13 14:21:39.312845 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:21:39.312858 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:21:39.312873 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 14:21:39.365522 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:21:39.396438 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (436) Dec 13 14:21:39.394462 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:21:39.406472 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:21:39.433503 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:21:39.452469 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:21:39.464506 systemd[1]: Starting disk-uuid.service... Dec 13 14:21:39.496279 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:21:39.496809 disk-uuid[509]: Primary Header is updated. Dec 13 14:21:39.496809 disk-uuid[509]: Secondary Entries is updated. Dec 13 14:21:39.496809 disk-uuid[509]: Secondary Header is updated. Dec 13 14:21:40.532032 disk-uuid[510]: The operation has completed successfully. Dec 13 14:21:40.540387 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:21:40.597868 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:21:40.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:40.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:40.598021 systemd[1]: Finished disk-uuid.service. Dec 13 14:21:40.613511 systemd[1]: Starting verity-setup.service... Dec 13 14:21:40.642282 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:21:40.735711 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:21:40.737180 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:21:40.756964 systemd[1]: Finished verity-setup.service. Dec 13 14:21:40.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:40.839271 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:21:40.840195 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:21:40.840617 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:21:40.888422 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:21:40.888465 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:21:40.888499 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:21:40.841568 systemd[1]: Starting ignition-setup.service... Dec 13 14:21:40.910399 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:21:40.853570 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:21:40.918965 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:21:40.940178 systemd[1]: Finished ignition-setup.service. Dec 13 14:21:40.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:40.950485 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:21:40.976227 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:21:40.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:40.986000 audit: BPF prog-id=9 op=LOAD Dec 13 14:21:40.988535 systemd[1]: Starting systemd-networkd.service... Dec 13 14:21:41.020669 systemd-networkd[684]: lo: Link UP Dec 13 14:21:41.020683 systemd-networkd[684]: lo: Gained carrier Dec 13 14:21:41.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.021505 systemd-networkd[684]: Enumeration completed Dec 13 14:21:41.021654 systemd[1]: Started systemd-networkd.service. Dec 13 14:21:41.022053 systemd-networkd[684]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:21:41.024358 systemd-networkd[684]: eth0: Link UP Dec 13 14:21:41.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.024365 systemd-networkd[684]: eth0: Gained carrier Dec 13 14:21:41.112403 iscsid[692]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:21:41.112403 iscsid[692]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:21:41.112403 iscsid[692]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:21:41.112403 iscsid[692]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:21:41.112403 iscsid[692]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:21:41.112403 iscsid[692]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:21:41.112403 iscsid[692]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:21:41.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.036718 systemd[1]: Reached target network.target. Dec 13 14:21:41.253507 ignition[664]: Ignition 2.14.0 Dec 13 14:21:41.037410 systemd-networkd[684]: eth0: DHCPv4 address 10.128.0.29/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:21:41.253523 ignition[664]: Stage: fetch-offline Dec 13 14:21:41.052710 systemd[1]: Starting iscsiuio.service... Dec 13 14:21:41.253608 ignition[664]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:21:41.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.062870 systemd[1]: Started iscsiuio.service. Dec 13 14:21:41.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.253652 ignition[664]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:21:41.091869 systemd[1]: Starting iscsid.service... Dec 13 14:21:41.275552 ignition[664]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:21:41.100185 systemd[1]: Started iscsid.service. Dec 13 14:21:41.276479 ignition[664]: parsed url from cmdline: "" Dec 13 14:21:41.121068 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:21:41.276487 ignition[664]: no config URL provided Dec 13 14:21:41.189727 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:21:41.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.276506 ignition[664]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:21:41.220658 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:21:41.276527 ignition[664]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:21:41.239415 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:21:41.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.276540 ignition[664]: failed to fetch config: resource requires networking Dec 13 14:21:41.248426 systemd[1]: Reached target remote-fs.target. Dec 13 14:21:41.277594 ignition[664]: Ignition finished successfully Dec 13 14:21:41.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.258762 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:21:41.345815 ignition[708]: Ignition 2.14.0 Dec 13 14:21:41.291847 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:21:41.345826 ignition[708]: Stage: fetch Dec 13 14:21:41.312900 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:21:41.345971 ignition[708]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:21:41.332050 systemd[1]: Starting ignition-fetch.service... Dec 13 14:21:41.346002 ignition[708]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:21:41.367254 unknown[708]: fetched base config from "system" Dec 13 14:21:41.353649 ignition[708]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:21:41.367270 unknown[708]: fetched base config from "system" Dec 13 14:21:41.353843 ignition[708]: parsed url from cmdline: "" Dec 13 14:21:41.367280 unknown[708]: fetched user config from "gcp" Dec 13 14:21:41.353850 ignition[708]: no config URL provided Dec 13 14:21:41.378890 systemd[1]: Finished ignition-fetch.service. Dec 13 14:21:41.353861 ignition[708]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:21:41.387099 systemd[1]: Starting ignition-kargs.service... Dec 13 14:21:41.353876 ignition[708]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:21:41.424741 systemd[1]: Finished ignition-kargs.service. Dec 13 14:21:41.353927 ignition[708]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 14:21:41.441800 systemd[1]: Starting ignition-disks.service... Dec 13 14:21:41.364221 ignition[708]: GET result: OK Dec 13 14:21:41.466789 systemd[1]: Finished ignition-disks.service. Dec 13 14:21:41.364299 ignition[708]: parsing config with SHA512: 9c23f99e74bcc67d4cfd9b0e12f7390386e8abdac0419c65ed0e4f146aa8072112df8b86f9cba741483127242ac27673dd942164c069b55e7e38fdce72a8caa3 Dec 13 14:21:41.481825 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:21:41.367765 ignition[708]: fetch: fetch complete Dec 13 14:21:41.496474 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:21:41.367773 ignition[708]: fetch: fetch passed Dec 13 14:21:41.510455 systemd[1]: Reached target local-fs.target. Dec 13 14:21:41.367824 ignition[708]: Ignition finished successfully Dec 13 14:21:41.510590 systemd[1]: Reached target sysinit.target. Dec 13 14:21:41.400103 ignition[714]: Ignition 2.14.0 Dec 13 14:21:41.537581 systemd[1]: Reached target basic.target. Dec 13 14:21:41.400114 ignition[714]: Stage: kargs Dec 13 14:21:41.544831 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:21:41.400287 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:21:41.400327 ignition[714]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:21:41.407946 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:21:41.409129 ignition[714]: kargs: kargs passed Dec 13 14:21:41.409185 ignition[714]: Ignition finished successfully Dec 13 14:21:41.453736 ignition[720]: Ignition 2.14.0 Dec 13 14:21:41.453746 ignition[720]: Stage: disks Dec 13 14:21:41.453890 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:21:41.453921 ignition[720]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:21:41.461214 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:21:41.462482 ignition[720]: disks: disks passed Dec 13 14:21:41.462534 ignition[720]: Ignition finished successfully Dec 13 14:21:41.587157 systemd-fsck[728]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:21:41.785204 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:21:41.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:41.794663 systemd[1]: Mounting sysroot.mount... Dec 13 14:21:41.820265 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:21:41.825590 systemd[1]: Mounted sysroot.mount. Dec 13 14:21:41.832589 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:21:41.853363 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:21:41.870912 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:21:41.870999 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:21:41.871043 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:21:41.892028 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:21:41.947614 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (734) Dec 13 14:21:41.947662 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:21:41.947685 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:21:41.911024 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:21:41.958963 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:21:41.935759 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:21:41.986416 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:21:41.986615 initrd-setup-root[739]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:21:41.996533 initrd-setup-root[763]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:21:41.990146 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:21:42.023490 initrd-setup-root[771]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:21:42.033378 initrd-setup-root[781]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:21:42.059945 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:21:42.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:42.061201 systemd[1]: Starting ignition-mount.service... Dec 13 14:21:42.089465 systemd[1]: Starting sysroot-boot.service... Dec 13 14:21:42.097649 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:21:42.097761 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:21:42.121270 ignition[799]: INFO : Ignition 2.14.0 Dec 13 14:21:42.121270 ignition[799]: INFO : Stage: mount Dec 13 14:21:42.121270 ignition[799]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:21:42.121270 ignition[799]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:21:42.197456 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:21:42.197503 kernel: audit: type=1130 audit(1734099702.151:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:42.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:42.197649 ignition[799]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:21:42.197649 ignition[799]: INFO : mount: mount passed Dec 13 14:21:42.197649 ignition[799]: INFO : Ignition finished successfully Dec 13 14:21:42.273431 kernel: audit: type=1130 audit(1734099702.205:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:42.273474 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (809) Dec 13 14:21:42.273497 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:21:42.273532 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:21:42.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:42.130724 systemd[1]: Finished ignition-mount.service. Dec 13 14:21:42.284722 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:21:42.155017 systemd[1]: Finished sysroot-boot.service. Dec 13 14:21:42.310462 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:21:42.208086 systemd[1]: Starting ignition-files.service... Dec 13 14:21:42.241651 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:21:42.306740 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:21:42.343428 ignition[828]: INFO : Ignition 2.14.0 Dec 13 14:21:42.343428 ignition[828]: INFO : Stage: files Dec 13 14:21:42.343428 ignition[828]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:21:42.343428 ignition[828]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:21:42.343428 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:21:42.343428 ignition[828]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:21:42.421377 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (830) Dec 13 14:21:42.356668 unknown[828]: wrote ssh authorized keys file for user: core Dec 13 14:21:42.430413 ignition[828]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:21:42.430413 ignition[828]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:21:42.430413 ignition[828]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:21:42.430413 ignition[828]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:21:42.430413 ignition[828]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2838979982" Dec 13 14:21:42.430413 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2838979982": device or resource busy Dec 13 14:21:42.430413 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2838979982", trying btrfs: device or resource busy Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2838979982" Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2838979982" Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem2838979982" Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem2838979982" Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:21:42.430413 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem747503801" Dec 13 14:21:42.687456 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem747503801": device or resource busy Dec 13 14:21:42.687456 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem747503801", trying btrfs: device or resource busy Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem747503801" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem747503801" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem747503801" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem747503801" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:21:42.687456 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1350256373" Dec 13 14:21:42.929473 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1350256373": device or resource busy Dec 13 14:21:42.929473 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1350256373", trying btrfs: device or resource busy Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1350256373" Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1350256373" Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1350256373" Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1350256373" Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:21:42.929473 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2430446174" Dec 13 14:21:42.929473 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2430446174": device or resource busy Dec 13 14:21:42.758429 systemd-networkd[684]: eth0: Gained IPv6LL Dec 13 14:21:43.179446 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2430446174", trying btrfs: device or resource busy Dec 13 14:21:43.179446 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2430446174" Dec 13 14:21:43.179446 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2430446174" Dec 13 14:21:43.179446 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem2430446174" Dec 13 14:21:43.179446 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem2430446174" Dec 13 14:21:43.179446 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:21:43.179446 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:21:43.179446 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:21:43.179446 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK Dec 13 14:21:43.361616 kernel: audit: type=1130 audit(1734099703.271:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.361733 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(17): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(17): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(18): [started] processing unit "oem-gce.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(18): [finished] processing unit "oem-gce.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(19): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(19): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(1a): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(1a): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(1b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(1b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(1c): [started] setting preset to enabled for "oem-gce.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: op(1c): [finished] setting preset to enabled for "oem-gce.service" Dec 13 14:21:43.361733 ignition[828]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:21:43.361733 ignition[828]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:21:43.361733 ignition[828]: INFO : files: files passed Dec 13 14:21:43.361733 ignition[828]: INFO : Ignition finished successfully Dec 13 14:21:43.818446 kernel: audit: type=1130 audit(1734099703.379:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.818518 kernel: audit: type=1130 audit(1734099703.419:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.818544 kernel: audit: type=1131 audit(1734099703.419:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.818568 kernel: audit: type=1130 audit(1734099703.528:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.818591 kernel: audit: type=1131 audit(1734099703.528:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.818609 kernel: audit: type=1130 audit(1734099703.645:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.818628 kernel: audit: type=1131 audit(1734099703.783:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.253176 systemd[1]: Finished ignition-files.service. Dec 13 14:21:43.282355 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:21:43.849483 initrd-setup-root-after-ignition[851]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:21:43.318471 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:21:43.319679 systemd[1]: Starting ignition-quench.service... Dec 13 14:21:43.337004 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:21:43.380992 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:21:43.381151 systemd[1]: Finished ignition-quench.service. Dec 13 14:21:43.420840 systemd[1]: Reached target ignition-complete.target. Dec 13 14:21:43.487592 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:21:43.519945 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:21:43.520066 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:21:43.529790 systemd[1]: Reached target initrd-fs.target. Dec 13 14:21:44.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.587636 systemd[1]: Reached target initrd.target. Dec 13 14:21:43.605734 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:21:44.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.607126 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:21:44.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.632750 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:21:44.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.648199 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:21:44.098428 ignition[866]: INFO : Ignition 2.14.0 Dec 13 14:21:44.098428 ignition[866]: INFO : Stage: umount Dec 13 14:21:44.098428 ignition[866]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:21:44.098428 ignition[866]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:21:43.695895 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:21:44.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.168541 iscsid[692]: iscsid shutting down. Dec 13 14:21:44.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.191671 ignition[866]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:21:44.191671 ignition[866]: INFO : umount: umount passed Dec 13 14:21:44.191671 ignition[866]: INFO : Ignition finished successfully Dec 13 14:21:44.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.722731 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:21:44.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.735837 systemd[1]: Stopped target timers.target. Dec 13 14:21:44.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.777748 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:21:44.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.777945 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:21:44.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.785040 systemd[1]: Stopped target initrd.target. Dec 13 14:21:44.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.825743 systemd[1]: Stopped target basic.target. Dec 13 14:21:43.839844 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:21:43.857740 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:21:43.879721 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:21:43.904849 systemd[1]: Stopped target remote-fs.target. Dec 13 14:21:43.919743 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:21:44.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.935758 systemd[1]: Stopped target sysinit.target. Dec 13 14:21:44.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:43.951763 systemd[1]: Stopped target local-fs.target. Dec 13 14:21:43.966702 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:21:43.982744 systemd[1]: Stopped target swap.target. Dec 13 14:21:44.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.004652 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:21:44.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.004839 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:21:44.019972 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:21:44.034661 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:21:44.034868 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:21:44.041865 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:21:44.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.042057 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:21:44.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.555000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:21:44.068816 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:21:44.069005 systemd[1]: Stopped ignition-files.service. Dec 13 14:21:44.086358 systemd[1]: Stopping ignition-mount.service... Dec 13 14:21:44.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.119787 systemd[1]: Stopping iscsid.service... Dec 13 14:21:44.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.130585 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:21:44.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.130828 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:21:44.156433 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:21:44.175430 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:21:44.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.175727 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:21:44.184735 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:21:44.184914 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:21:44.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.203450 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:21:44.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.204611 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:21:44.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.204729 systemd[1]: Stopped iscsid.service. Dec 13 14:21:44.218164 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:21:44.218311 systemd[1]: Stopped ignition-mount.service. Dec 13 14:21:44.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.233073 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:21:44.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.233188 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:21:44.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.248211 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:21:44.248396 systemd[1]: Stopped ignition-disks.service. Dec 13 14:21:44.264531 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:21:44.264614 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:21:44.279538 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:21:44.279621 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:21:44.904554 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Dec 13 14:21:44.295529 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:21:44.295613 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:21:44.310522 systemd[1]: Stopped target paths.target. Dec 13 14:21:44.324431 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:21:44.326340 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:21:44.339441 systemd[1]: Stopped target slices.target. Dec 13 14:21:44.353428 systemd[1]: Stopped target sockets.target. Dec 13 14:21:44.367483 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:21:44.367560 systemd[1]: Closed iscsid.socket. Dec 13 14:21:44.382489 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:21:44.382583 systemd[1]: Stopped ignition-setup.service. Dec 13 14:21:44.397543 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:21:44.397629 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:21:44.413662 systemd[1]: Stopping iscsiuio.service... Dec 13 14:21:44.427999 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:21:44.428120 systemd[1]: Stopped iscsiuio.service. Dec 13 14:21:44.448019 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:21:44.448136 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:21:44.464668 systemd[1]: Stopped target network.target. Dec 13 14:21:44.479581 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:21:44.479646 systemd[1]: Closed iscsiuio.socket. Dec 13 14:21:44.493709 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:21:44.497326 systemd-networkd[684]: eth0: DHCPv6 lease lost Dec 13 14:21:44.914000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:21:44.501828 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:21:44.523793 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:21:44.523934 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:21:44.539152 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:21:44.539331 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:21:44.557060 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:21:44.557103 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:21:44.574493 systemd[1]: Stopping network-cleanup.service... Dec 13 14:21:44.588408 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:21:44.588533 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:21:44.603560 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:21:44.603640 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:21:44.618678 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:21:44.618744 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:21:44.633702 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:21:44.662170 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:21:44.662851 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:21:44.663013 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:21:44.677423 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:21:44.677495 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:21:44.693657 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:21:44.693750 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:21:44.710489 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:21:44.710589 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:21:44.728595 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:21:44.728668 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:21:44.743540 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:21:44.743619 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:21:44.760595 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:21:44.783515 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:21:44.783635 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:21:44.800234 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:21:44.800406 systemd[1]: Stopped network-cleanup.service. Dec 13 14:21:44.814917 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:21:44.815055 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:21:44.830809 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:21:44.846603 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:21:44.868653 systemd[1]: Switching root. Dec 13 14:21:44.917138 systemd-journald[190]: Journal stopped Dec 13 14:21:49.616067 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:21:49.616185 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:21:49.616218 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:21:49.617003 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:21:49.617037 kernel: SELinux: policy capability open_perms=1 Dec 13 14:21:49.617069 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:21:49.617100 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:21:49.617124 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:21:49.617156 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:21:49.617181 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:21:49.617206 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:21:49.617234 systemd[1]: Successfully loaded SELinux policy in 110.116ms. Dec 13 14:21:49.617296 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.060ms. Dec 13 14:21:49.617324 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:21:49.617356 systemd[1]: Detected virtualization kvm. Dec 13 14:21:49.617380 systemd[1]: Detected architecture x86-64. Dec 13 14:21:49.617405 systemd[1]: Detected first boot. Dec 13 14:21:49.617439 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:21:49.617466 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:21:49.617488 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:21:49.617509 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:21:49.617534 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:21:49.617565 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:21:49.617597 kernel: kauditd_printk_skb: 50 callbacks suppressed Dec 13 14:21:49.617619 kernel: audit: type=1334 audit(1734099708.727:89): prog-id=12 op=LOAD Dec 13 14:21:49.617640 kernel: audit: type=1334 audit(1734099708.727:90): prog-id=3 op=UNLOAD Dec 13 14:21:49.617660 kernel: audit: type=1334 audit(1734099708.733:91): prog-id=13 op=LOAD Dec 13 14:21:49.617681 kernel: audit: type=1334 audit(1734099708.740:92): prog-id=14 op=LOAD Dec 13 14:21:49.617701 kernel: audit: type=1334 audit(1734099708.740:93): prog-id=4 op=UNLOAD Dec 13 14:21:49.617724 kernel: audit: type=1334 audit(1734099708.740:94): prog-id=5 op=UNLOAD Dec 13 14:21:49.617745 kernel: audit: type=1334 audit(1734099708.747:95): prog-id=15 op=LOAD Dec 13 14:21:49.617768 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:21:49.617792 kernel: audit: type=1334 audit(1734099708.747:96): prog-id=12 op=UNLOAD Dec 13 14:21:49.617813 kernel: audit: type=1334 audit(1734099708.754:97): prog-id=16 op=LOAD Dec 13 14:21:49.617835 kernel: audit: type=1334 audit(1734099708.761:98): prog-id=17 op=LOAD Dec 13 14:21:49.617856 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:21:49.617888 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:21:49.617912 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:21:49.617939 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:21:49.617963 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:21:49.617985 systemd[1]: Created slice system-getty.slice. Dec 13 14:21:49.618008 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:21:49.618030 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:21:49.618053 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:21:49.618077 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:21:49.618099 systemd[1]: Created slice user.slice. Dec 13 14:21:49.618125 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:21:49.618148 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:21:49.618171 systemd[1]: Set up automount boot.automount. Dec 13 14:21:49.618196 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:21:49.618218 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:21:49.618253 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:21:49.618287 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:21:49.618313 systemd[1]: Reached target integritysetup.target. Dec 13 14:21:49.618339 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:21:49.618367 systemd[1]: Reached target remote-fs.target. Dec 13 14:21:49.618391 systemd[1]: Reached target slices.target. Dec 13 14:21:49.618416 systemd[1]: Reached target swap.target. Dec 13 14:21:49.618440 systemd[1]: Reached target torcx.target. Dec 13 14:21:49.618469 systemd[1]: Reached target veritysetup.target. Dec 13 14:21:49.618495 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:21:49.618519 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:21:49.618543 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:21:49.618565 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:21:49.618589 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:21:49.618617 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:21:49.618641 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:21:49.618664 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:21:49.618688 systemd[1]: Mounting media.mount... Dec 13 14:21:49.618711 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:49.618740 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:21:49.618763 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:21:49.618787 systemd[1]: Mounting tmp.mount... Dec 13 14:21:49.618811 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:21:49.618841 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:21:49.618863 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:21:49.618894 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:21:49.618918 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:21:49.618942 systemd[1]: Starting modprobe@drm.service... Dec 13 14:21:49.618965 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:21:49.618989 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:21:49.619014 systemd[1]: Starting modprobe@loop.service... Dec 13 14:21:49.619037 kernel: fuse: init (API version 7.34) Dec 13 14:21:49.619065 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:21:49.619089 kernel: loop: module loaded Dec 13 14:21:49.619111 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:21:49.619135 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:21:49.619159 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:21:49.619183 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:21:49.619206 systemd[1]: Stopped systemd-journald.service. Dec 13 14:21:49.619229 systemd[1]: Starting systemd-journald.service... Dec 13 14:21:49.619274 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:21:49.619302 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:21:49.619326 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:21:49.619356 systemd-journald[990]: Journal started Dec 13 14:21:49.619457 systemd-journald[990]: Runtime Journal (/run/log/journal/974c9488a37b48ce809ad8417b1d526f) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:21:45.221000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:21:45.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:21:45.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:21:45.366000 audit: BPF prog-id=10 op=LOAD Dec 13 14:21:45.366000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:21:45.366000 audit: BPF prog-id=11 op=LOAD Dec 13 14:21:45.366000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:21:45.535000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:21:45.535000 audit[899]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.535000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:21:45.545000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:21:45.545000 audit[899]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879b9 a2=1ed a3=0 items=2 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.545000 audit: CWD cwd="/" Dec 13 14:21:45.545000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:45.545000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:45.545000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:21:48.727000 audit: BPF prog-id=12 op=LOAD Dec 13 14:21:48.727000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:21:48.733000 audit: BPF prog-id=13 op=LOAD Dec 13 14:21:48.740000 audit: BPF prog-id=14 op=LOAD Dec 13 14:21:48.740000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:21:48.740000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:21:48.747000 audit: BPF prog-id=15 op=LOAD Dec 13 14:21:48.747000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:21:48.754000 audit: BPF prog-id=16 op=LOAD Dec 13 14:21:48.761000 audit: BPF prog-id=17 op=LOAD Dec 13 14:21:48.761000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:21:48.761000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:21:48.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:48.816000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:21:48.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:48.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.565000 audit: BPF prog-id=18 op=LOAD Dec 13 14:21:49.565000 audit: BPF prog-id=19 op=LOAD Dec 13 14:21:49.565000 audit: BPF prog-id=20 op=LOAD Dec 13 14:21:49.565000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:21:49.565000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:21:49.611000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:21:49.611000 audit[990]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd515b9490 a2=4000 a3=7ffd515b952c items=0 ppid=1 pid=990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:49.611000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:21:45.531662 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:21:48.726688 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:21:45.532918 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:21:48.763691 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:21:45.532959 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:21:45.533013 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:21:45.533033 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:21:45.533090 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:21:45.533115 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:21:45.533454 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:21:45.533519 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:21:45.533544 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:21:45.535230 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:21:45.535307 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:21:45.535332 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:21:45.535350 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:21:45.535372 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:21:45.535389 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:21:48.083905 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:21:48.084205 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:21:48.084401 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:21:48.084639 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:21:48.084700 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:21:48.084783 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T14:21:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:21:49.641348 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:21:49.655273 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:21:49.661754 systemd[1]: Stopped verity-setup.service. Dec 13 14:21:49.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.680272 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:49.689290 systemd[1]: Started systemd-journald.service. Dec 13 14:21:49.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.698720 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:21:49.705634 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:21:49.712623 systemd[1]: Mounted media.mount. Dec 13 14:21:49.719623 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:21:49.728637 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:21:49.737609 systemd[1]: Mounted tmp.mount. Dec 13 14:21:49.744776 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:21:49.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.753893 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:21:49.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.762838 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:21:49.763083 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:21:49.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.771880 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:21:49.772099 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:21:49.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.781829 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:21:49.782067 systemd[1]: Finished modprobe@drm.service. Dec 13 14:21:49.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.790824 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:21:49.791034 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:21:49.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.799827 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:21:49.800046 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:21:49.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.808821 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:21:49.809044 systemd[1]: Finished modprobe@loop.service. Dec 13 14:21:49.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.817835 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:21:49.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.826951 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:21:49.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.835867 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:21:49.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.844844 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:21:49.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.854218 systemd[1]: Reached target network-pre.target. Dec 13 14:21:49.865055 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:21:49.874924 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:21:49.882411 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:21:49.886252 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:21:49.895383 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:21:49.906503 systemd-journald[990]: Time spent on flushing to /var/log/journal/974c9488a37b48ce809ad8417b1d526f is 74.853ms for 1135 entries. Dec 13 14:21:49.906503 systemd-journald[990]: System Journal (/var/log/journal/974c9488a37b48ce809ad8417b1d526f) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:21:50.029555 systemd-journald[990]: Received client request to flush runtime journal. Dec 13 14:21:49.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:49.903429 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:21:49.905299 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:21:49.920456 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:21:49.922413 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:21:49.931283 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:21:50.032620 udevadm[1004]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:21:49.941644 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:21:49.951748 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:21:49.960585 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:21:49.969858 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:21:49.978882 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:21:49.991989 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:21:50.000744 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:21:50.030988 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:21:50.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:50.614992 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:21:50.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:50.623000 audit: BPF prog-id=21 op=LOAD Dec 13 14:21:50.623000 audit: BPF prog-id=22 op=LOAD Dec 13 14:21:50.623000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:21:50.623000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:21:50.625407 systemd[1]: Starting systemd-udevd.service... Dec 13 14:21:50.648747 systemd-udevd[1007]: Using default interface naming scheme 'v252'. Dec 13 14:21:50.700778 systemd[1]: Started systemd-udevd.service. Dec 13 14:21:50.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:50.711000 audit: BPF prog-id=23 op=LOAD Dec 13 14:21:50.714035 systemd[1]: Starting systemd-networkd.service... Dec 13 14:21:50.729000 audit: BPF prog-id=24 op=LOAD Dec 13 14:21:50.730000 audit: BPF prog-id=25 op=LOAD Dec 13 14:21:50.730000 audit: BPF prog-id=26 op=LOAD Dec 13 14:21:50.732692 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:21:50.771734 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:21:50.818564 systemd[1]: Started systemd-userdbd.service. Dec 13 14:21:50.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:50.940268 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1014) Dec 13 14:21:50.962278 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:21:50.962743 systemd-networkd[1021]: lo: Link UP Dec 13 14:21:50.963166 systemd-networkd[1021]: lo: Gained carrier Dec 13 14:21:50.964095 systemd-networkd[1021]: Enumeration completed Dec 13 14:21:50.964638 systemd[1]: Started systemd-networkd.service. Dec 13 14:21:50.965008 systemd-networkd[1021]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:21:50.967521 systemd-networkd[1021]: eth0: Link UP Dec 13 14:21:50.967841 systemd-networkd[1021]: eth0: Gained carrier Dec 13 14:21:50.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:50.977258 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:21:50.988273 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 14:21:50.997290 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:21:50.997474 systemd-networkd[1021]: eth0: DHCPv4 address 10.128.0.29/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:21:51.023629 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:21:51.038000 audit[1009]: AVC avc: denied { confidentiality } for pid=1009 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:21:51.038000 audit[1009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bcf9afb720 a1=337fc a2=7f1d43f59bc5 a3=5 items=110 ppid=1007 pid=1009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:51.038000 audit: CWD cwd="/" Dec 13 14:21:51.038000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=1 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=2 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=3 name=(null) inode=14420 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=4 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=5 name=(null) inode=14421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=6 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=7 name=(null) inode=14422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=8 name=(null) inode=14422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=9 name=(null) inode=14423 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=10 name=(null) inode=14422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=11 name=(null) inode=14424 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=12 name=(null) inode=14422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=13 name=(null) inode=14425 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=14 name=(null) inode=14422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=15 name=(null) inode=14426 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=16 name=(null) inode=14422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=17 name=(null) inode=14427 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=18 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=19 name=(null) inode=14428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=20 name=(null) inode=14428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=21 name=(null) inode=14429 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=22 name=(null) inode=14428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=23 name=(null) inode=14430 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=24 name=(null) inode=14428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=25 name=(null) inode=14431 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=26 name=(null) inode=14428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=27 name=(null) inode=14432 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=28 name=(null) inode=14428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=29 name=(null) inode=14433 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=30 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=31 name=(null) inode=14434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=32 name=(null) inode=14434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=33 name=(null) inode=14435 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=34 name=(null) inode=14434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=35 name=(null) inode=14436 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=36 name=(null) inode=14434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=37 name=(null) inode=14437 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=38 name=(null) inode=14434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=39 name=(null) inode=14438 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=40 name=(null) inode=14434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=41 name=(null) inode=14439 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=42 name=(null) inode=14419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=43 name=(null) inode=14440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=44 name=(null) inode=14440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=45 name=(null) inode=14441 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=46 name=(null) inode=14440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=47 name=(null) inode=14442 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.080282 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:21:51.038000 audit: PATH item=48 name=(null) inode=14440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=49 name=(null) inode=14443 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=50 name=(null) inode=14440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=51 name=(null) inode=14444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=52 name=(null) inode=14440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=53 name=(null) inode=14445 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=55 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=56 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=57 name=(null) inode=14447 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=58 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=59 name=(null) inode=14448 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=60 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=61 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=62 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=63 name=(null) inode=14450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=64 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=65 name=(null) inode=14451 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=66 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=67 name=(null) inode=14452 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=68 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=69 name=(null) inode=14453 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=70 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=71 name=(null) inode=14454 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=72 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=73 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=74 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=75 name=(null) inode=14456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=76 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=77 name=(null) inode=14457 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=78 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=79 name=(null) inode=14458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=80 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=81 name=(null) inode=14459 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=82 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=83 name=(null) inode=14460 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=84 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=85 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=86 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=87 name=(null) inode=14462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=88 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=89 name=(null) inode=14463 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=90 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=91 name=(null) inode=14464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=92 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=93 name=(null) inode=14465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=94 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=95 name=(null) inode=14466 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=96 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=97 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=98 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=99 name=(null) inode=14468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=100 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=101 name=(null) inode=14469 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=102 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=103 name=(null) inode=14470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=104 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=105 name=(null) inode=14471 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=106 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=107 name=(null) inode=14472 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PATH item=109 name=(null) inode=14473 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:51.038000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:21:51.101266 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 14:21:51.122303 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 14:21:51.135292 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:21:51.153788 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:21:51.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.164099 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:21:51.194986 lvm[1040]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:21:51.225763 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:21:51.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.235678 systemd[1]: Reached target cryptsetup.target. Dec 13 14:21:51.245988 systemd[1]: Starting lvm2-activation.service... Dec 13 14:21:51.252405 lvm[1041]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:21:51.284722 systemd[1]: Finished lvm2-activation.service. Dec 13 14:21:51.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.293675 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:21:51.302473 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:21:51.302526 systemd[1]: Reached target local-fs.target. Dec 13 14:21:51.311448 systemd[1]: Reached target machines.target. Dec 13 14:21:51.321025 systemd[1]: Starting ldconfig.service... Dec 13 14:21:51.329286 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:21:51.329395 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:21:51.331130 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:21:51.340195 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:21:51.353413 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:21:51.355691 systemd[1]: Starting systemd-sysext.service... Dec 13 14:21:51.356490 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1043 (bootctl) Dec 13 14:21:51.358685 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:21:51.381726 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:21:51.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.389836 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:21:51.392501 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:21:51.392926 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:21:51.418311 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:21:51.525181 systemd-fsck[1053]: fsck.fat 4.2 (2021-01-31) Dec 13 14:21:51.525181 systemd-fsck[1053]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:21:51.528021 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:21:51.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.541060 systemd[1]: Mounting boot.mount... Dec 13 14:21:51.596854 systemd[1]: Mounted boot.mount. Dec 13 14:21:51.621320 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:21:51.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.735515 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:21:51.736527 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:21:51.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.771275 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:21:51.796290 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:21:51.817552 (sd-sysext)[1059]: Using extensions 'kubernetes'. Dec 13 14:21:51.818414 (sd-sysext)[1059]: Merged extensions into '/usr'. Dec 13 14:21:51.842443 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:51.845163 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:21:51.853661 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:21:51.856132 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:21:51.865528 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:21:51.874305 systemd[1]: Starting modprobe@loop.service... Dec 13 14:21:51.881486 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:21:51.881993 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:21:51.882216 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:51.886694 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:21:51.894009 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:21:51.894221 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:21:51.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.904373 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:21:51.904626 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:21:51.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.914180 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:21:51.914421 systemd[1]: Finished modprobe@loop.service. Dec 13 14:21:51.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.923766 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:21:51.923968 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:21:51.926639 systemd[1]: Finished systemd-sysext.service. Dec 13 14:21:51.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.937729 systemd[1]: Starting ensure-sysext.service... Dec 13 14:21:51.947074 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:21:51.959519 systemd[1]: Reloading. Dec 13 14:21:51.985328 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:21:52.003354 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:21:52.022263 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:21:52.045013 ldconfig[1042]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:21:52.065249 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2024-12-13T14:21:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:21:52.065295 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2024-12-13T14:21:52Z" level=info msg="torcx already run" Dec 13 14:21:52.166417 systemd-networkd[1021]: eth0: Gained IPv6LL Dec 13 14:21:52.232656 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:21:52.232693 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:21:52.274565 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:21:52.363000 audit: BPF prog-id=27 op=LOAD Dec 13 14:21:52.363000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:21:52.363000 audit: BPF prog-id=28 op=LOAD Dec 13 14:21:52.363000 audit: BPF prog-id=29 op=LOAD Dec 13 14:21:52.363000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:21:52.363000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:21:52.364000 audit: BPF prog-id=30 op=LOAD Dec 13 14:21:52.365000 audit: BPF prog-id=31 op=LOAD Dec 13 14:21:52.365000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:21:52.365000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:21:52.366000 audit: BPF prog-id=32 op=LOAD Dec 13 14:21:52.366000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:21:52.367000 audit: BPF prog-id=33 op=LOAD Dec 13 14:21:52.367000 audit: BPF prog-id=34 op=LOAD Dec 13 14:21:52.367000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:21:52.367000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:21:52.370000 audit: BPF prog-id=35 op=LOAD Dec 13 14:21:52.370000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:21:52.376119 systemd[1]: Finished ldconfig.service. Dec 13 14:21:52.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:52.385428 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:21:52.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:52.402518 systemd[1]: Starting audit-rules.service... Dec 13 14:21:52.412435 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:21:52.422694 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:21:52.435085 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:21:52.443000 audit: BPF prog-id=36 op=LOAD Dec 13 14:21:52.446749 systemd[1]: Starting systemd-resolved.service... Dec 13 14:21:52.454000 audit: BPF prog-id=37 op=LOAD Dec 13 14:21:52.458053 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:21:52.467612 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:21:52.474000 audit[1156]: SYSTEM_BOOT pid=1156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:21:52.476600 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:21:52.486133 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:21:52.486402 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:21:52.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:52.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:52.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:52.496561 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:21:52.495000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:21:52.495000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd1d7da20 a2=420 a3=0 items=0 ppid=1130 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:52.495000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:21:52.497674 augenrules[1160]: No rules Dec 13 14:21:52.507066 systemd[1]: Finished audit-rules.service. Dec 13 14:21:52.520354 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:52.520894 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:21:52.527639 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:21:52.536775 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:21:52.546699 systemd[1]: Starting modprobe@loop.service... Dec 13 14:21:52.556634 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:21:52.565511 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:21:52.565901 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:21:52.568820 systemd[1]: Starting systemd-update-done.service... Dec 13 14:21:52.570669 enable-oslogin[1168]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:21:52.576416 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:21:52.576762 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:52.580556 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:21:52.580805 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:21:52.590470 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:21:52.590695 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:21:52.599755 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:21:52.599973 systemd[1]: Finished modprobe@loop.service. Dec 13 14:21:52.609340 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:21:52.609573 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:21:52.619483 systemd[1]: Finished systemd-update-done.service. Dec 13 14:21:52.629888 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:21:52.630258 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:21:52.635543 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:52.636005 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:21:52.640127 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:21:52.649391 systemd-resolved[1147]: Positive Trust Anchors: Dec 13 14:21:52.649412 systemd-resolved[1147]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:21:52.649462 systemd-resolved[1147]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:21:52.650528 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:21:52.659719 systemd[1]: Starting modprobe@loop.service... Dec 13 14:21:52.668693 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:21:52.675318 enable-oslogin[1173]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:21:52.675600 systemd-resolved[1147]: Defaulting to hostname 'linux'. Dec 13 14:21:52.677465 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:21:52.677735 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:21:52.677925 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:21:52.678062 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:21:52.679572 systemd[1]: Started systemd-resolved.service. Dec 13 14:21:52.689223 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:21:52.697932 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:21:52.698145 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:21:52.707150 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:21:52.707392 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:21:52.716230 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:21:52.716471 systemd[1]: Finished modprobe@loop.service. Dec 13 14:21:52.719079 systemd-timesyncd[1152]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 14:21:52.719157 systemd-timesyncd[1152]: Initial clock synchronization to Fri 2024-12-13 14:21:52.526499 UTC. Dec 13 14:21:52.725807 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:21:52.735333 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:21:52.735585 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:21:52.745355 systemd[1]: Reached target network.target. Dec 13 14:21:52.753644 systemd[1]: Reached target nss-lookup.target. Dec 13 14:21:52.762655 systemd[1]: Reached target time-set.target. Dec 13 14:21:52.771624 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:21:52.771869 systemd[1]: Reached target sysinit.target. Dec 13 14:21:52.780737 systemd[1]: Started motdgen.path. Dec 13 14:21:52.787700 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:21:52.797886 systemd[1]: Started logrotate.timer. Dec 13 14:21:52.805805 systemd[1]: Started mdadm.timer. Dec 13 14:21:52.812643 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:21:52.821583 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:21:52.821815 systemd[1]: Reached target paths.target. Dec 13 14:21:52.829659 systemd[1]: Reached target timers.target. Dec 13 14:21:52.837117 systemd[1]: Listening on dbus.socket. Dec 13 14:21:52.846284 systemd[1]: Starting docker.socket... Dec 13 14:21:52.857849 systemd[1]: Listening on sshd.socket. Dec 13 14:21:52.865743 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:21:52.866060 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:21:52.869200 systemd[1]: Listening on docker.socket. Dec 13 14:21:52.879165 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:21:52.879387 systemd[1]: Reached target sockets.target. Dec 13 14:21:52.887652 systemd[1]: Reached target basic.target. Dec 13 14:21:52.894640 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:21:52.894829 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:21:52.896827 systemd[1]: Starting containerd.service... Dec 13 14:21:52.905607 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:21:52.918078 systemd[1]: Starting dbus.service... Dec 13 14:21:52.926122 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:21:52.936662 systemd[1]: Starting extend-filesystems.service... Dec 13 14:21:52.938849 jq[1180]: false Dec 13 14:21:52.943399 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:21:52.945781 systemd[1]: Starting modprobe@drm.service... Dec 13 14:21:52.954116 systemd[1]: Starting motdgen.service... Dec 13 14:21:52.964728 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:21:52.975479 systemd[1]: Starting sshd-keygen.service... Dec 13 14:21:52.992277 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:21:53.001406 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:21:53.006108 extend-filesystems[1181]: Found loop1 Dec 13 14:21:53.006108 extend-filesystems[1181]: Found sda Dec 13 14:21:53.006108 extend-filesystems[1181]: Found sda1 Dec 13 14:21:53.006108 extend-filesystems[1181]: Found sda2 Dec 13 14:21:53.006108 extend-filesystems[1181]: Found sda3 Dec 13 14:21:53.006108 extend-filesystems[1181]: Found usr Dec 13 14:21:53.006108 extend-filesystems[1181]: Found sda4 Dec 13 14:21:53.006108 extend-filesystems[1181]: Found sda6 Dec 13 14:21:53.006108 extend-filesystems[1181]: Found sda7 Dec 13 14:21:53.006108 extend-filesystems[1181]: Found sda9 Dec 13 14:21:53.006108 extend-filesystems[1181]: Checking size of /dev/sda9 Dec 13 14:21:53.296155 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 14:21:53.296224 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 14:21:53.001737 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 14:21:53.296471 update_engine[1201]: I1213 14:21:53.126483 1201 main.cc:92] Flatcar Update Engine starting Dec 13 14:21:53.296471 update_engine[1201]: I1213 14:21:53.142130 1201 update_check_scheduler.cc:74] Next update check in 7m9s Dec 13 14:21:53.127225 dbus-daemon[1179]: [system] SELinux support is enabled Dec 13 14:21:53.297794 extend-filesystems[1181]: Resized partition /dev/sda9 Dec 13 14:21:53.002657 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:21:53.142512 dbus-daemon[1179]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1021 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:21:53.308003 jq[1203]: true Dec 13 14:21:53.308450 extend-filesystems[1211]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:21:53.308450 extend-filesystems[1211]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 14:21:53.308450 extend-filesystems[1211]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 14:21:53.308450 extend-filesystems[1211]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 14:21:53.004296 systemd[1]: Starting update-engine.service... Dec 13 14:21:53.181572 dbus-daemon[1179]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:21:53.358083 extend-filesystems[1181]: Resized filesystem in /dev/sda9 Dec 13 14:21:53.013526 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:21:53.379403 env[1210]: time="2024-12-13T14:21:53.271724940Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:21:53.031266 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:21:53.380163 jq[1209]: true Dec 13 14:21:53.031561 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:21:53.034430 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:21:53.034671 systemd[1]: Finished modprobe@drm.service. Dec 13 14:21:53.055365 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:21:53.055586 systemd[1]: Finished motdgen.service. Dec 13 14:21:53.387856 bash[1248]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:21:53.063060 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:21:53.063357 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:21:53.389489 mkfs.ext4[1228]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 14:21:53.389489 mkfs.ext4[1228]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 14:21:53.389489 mkfs.ext4[1228]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 14:21:53.389489 mkfs.ext4[1228]: Filesystem UUID: 03f21ac8-2180-414b-a9b6-68fd23597f8a Dec 13 14:21:53.389489 mkfs.ext4[1228]: Superblock backups stored on blocks: Dec 13 14:21:53.389489 mkfs.ext4[1228]: 32768, 98304, 163840, 229376 Dec 13 14:21:53.389489 mkfs.ext4[1228]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:21:53.389489 mkfs.ext4[1228]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:21:53.389489 mkfs.ext4[1228]: Creating journal (8192 blocks): done Dec 13 14:21:53.389489 mkfs.ext4[1228]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:21:53.072129 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:21:53.089046 systemd[1]: Reached target network-online.target. Dec 13 14:21:53.109859 systemd[1]: Starting kubelet.service... Dec 13 14:21:53.113441 systemd[1]: Starting oem-gce.service... Dec 13 14:21:53.131602 systemd[1]: Starting systemd-logind.service... Dec 13 14:21:53.398439 umount[1244]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 14:21:53.140852 systemd[1]: Started dbus.service. Dec 13 14:21:53.400326 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:21:53.162510 systemd[1]: Finished ensure-sysext.service. Dec 13 14:21:53.182304 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:21:53.182367 systemd[1]: Reached target system-config.target. Dec 13 14:21:53.190487 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:21:53.190524 systemd[1]: Reached target user-config.target. Dec 13 14:21:53.198923 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:21:53.199205 systemd[1]: Finished extend-filesystems.service. Dec 13 14:21:53.211235 systemd[1]: Started update-engine.service. Dec 13 14:21:53.229938 systemd[1]: Started locksmithd.service. Dec 13 14:21:53.249744 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:21:53.348280 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:21:53.417786 coreos-metadata[1178]: Dec 13 14:21:53.416 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 14:21:53.424660 coreos-metadata[1178]: Dec 13 14:21:53.424 INFO Fetch failed with 404: resource not found Dec 13 14:21:53.424825 coreos-metadata[1178]: Dec 13 14:21:53.424 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 14:21:53.426338 coreos-metadata[1178]: Dec 13 14:21:53.425 INFO Fetch successful Dec 13 14:21:53.426338 coreos-metadata[1178]: Dec 13 14:21:53.425 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 14:21:53.426520 coreos-metadata[1178]: Dec 13 14:21:53.426 INFO Fetch failed with 404: resource not found Dec 13 14:21:53.426520 coreos-metadata[1178]: Dec 13 14:21:53.426 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 14:21:53.427082 coreos-metadata[1178]: Dec 13 14:21:53.427 INFO Fetch failed with 404: resource not found Dec 13 14:21:53.427209 coreos-metadata[1178]: Dec 13 14:21:53.427 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 14:21:53.428631 coreos-metadata[1178]: Dec 13 14:21:53.427 INFO Fetch successful Dec 13 14:21:53.431366 unknown[1178]: wrote ssh authorized keys file for user: core Dec 13 14:21:53.456263 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:21:53.456411 env[1210]: time="2024-12-13T14:21:53.456198213Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:21:53.458036 env[1210]: time="2024-12-13T14:21:53.457389662Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:53.462333 env[1210]: time="2024-12-13T14:21:53.461915688Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:21:53.462333 env[1210]: time="2024-12-13T14:21:53.461970097Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:53.467827 update-ssh-keys[1252]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:21:53.469052 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:21:53.492716 env[1210]: time="2024-12-13T14:21:53.492671838Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:21:53.492920 env[1210]: time="2024-12-13T14:21:53.492892181Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:53.493109 env[1210]: time="2024-12-13T14:21:53.493080232Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:21:53.493605 env[1210]: time="2024-12-13T14:21:53.493573874Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:53.493919 env[1210]: time="2024-12-13T14:21:53.493894209Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:53.496382 env[1210]: time="2024-12-13T14:21:53.496351129Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:21:53.496906 env[1210]: time="2024-12-13T14:21:53.496853697Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:21:53.497545 env[1210]: time="2024-12-13T14:21:53.497300019Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:21:53.498788 env[1210]: time="2024-12-13T14:21:53.497916639Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:21:53.498788 env[1210]: time="2024-12-13T14:21:53.497946928Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.502788686Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.502838499Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.502864308Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.502905189Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.502930854Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.502953932Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.502978437Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.503003031Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.503026194Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.503048533Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.503074967Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:21:53.503328 env[1210]: time="2024-12-13T14:21:53.503097740Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:21:53.505191 systemd-logind[1215]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:21:53.505254 systemd-logind[1215]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:21:53.505827 env[1210]: time="2024-12-13T14:21:53.503303948Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:21:53.505827 env[1210]: time="2024-12-13T14:21:53.505710425Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:21:53.505290 systemd-logind[1215]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506083299Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506134403Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506170690Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506291516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506316460Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506337964Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506358357Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506388956Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506413693Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506434646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506454933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.506543 env[1210]: time="2024-12-13T14:21:53.506482499Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:21:53.507096 env[1210]: time="2024-12-13T14:21:53.506651748Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.507096 env[1210]: time="2024-12-13T14:21:53.506680476Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.507096 env[1210]: time="2024-12-13T14:21:53.506702145Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.507096 env[1210]: time="2024-12-13T14:21:53.506722371Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:21:53.507096 env[1210]: time="2024-12-13T14:21:53.506748109Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:21:53.507096 env[1210]: time="2024-12-13T14:21:53.506767792Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:21:53.507096 env[1210]: time="2024-12-13T14:21:53.506795413Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:21:53.507096 env[1210]: time="2024-12-13T14:21:53.506846333Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:21:53.507488 env[1210]: time="2024-12-13T14:21:53.507158910Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:21:53.507488 env[1210]: time="2024-12-13T14:21:53.507281714Z" level=info msg="Connect containerd service" Dec 13 14:21:53.507488 env[1210]: time="2024-12-13T14:21:53.507343802Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:21:53.513404 env[1210]: time="2024-12-13T14:21:53.508112775Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:21:53.513404 env[1210]: time="2024-12-13T14:21:53.508509268Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:21:53.513404 env[1210]: time="2024-12-13T14:21:53.508572632Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:21:53.513404 env[1210]: time="2024-12-13T14:21:53.508636570Z" level=info msg="containerd successfully booted in 0.272220s" Dec 13 14:21:53.509038 systemd[1]: Started containerd.service. Dec 13 14:21:53.509637 systemd-logind[1215]: New seat seat0. Dec 13 14:21:53.517182 systemd[1]: Started systemd-logind.service. Dec 13 14:21:53.527266 env[1210]: time="2024-12-13T14:21:53.526948930Z" level=info msg="Start subscribing containerd event" Dec 13 14:21:53.527266 env[1210]: time="2024-12-13T14:21:53.527102877Z" level=info msg="Start recovering state" Dec 13 14:21:53.527561 env[1210]: time="2024-12-13T14:21:53.527490023Z" level=info msg="Start event monitor" Dec 13 14:21:53.527745 env[1210]: time="2024-12-13T14:21:53.527686307Z" level=info msg="Start snapshots syncer" Dec 13 14:21:53.527902 env[1210]: time="2024-12-13T14:21:53.527726150Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:21:53.527902 env[1210]: time="2024-12-13T14:21:53.527846459Z" level=info msg="Start streaming server" Dec 13 14:21:53.610949 dbus-daemon[1179]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:21:53.611163 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:21:53.612368 dbus-daemon[1179]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1232 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:21:53.624389 systemd[1]: Starting polkit.service... Dec 13 14:21:53.740103 polkitd[1256]: Started polkitd version 121 Dec 13 14:21:53.773438 polkitd[1256]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:21:53.773728 polkitd[1256]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:21:53.777961 polkitd[1256]: Finished loading, compiling and executing 2 rules Dec 13 14:21:53.782779 dbus-daemon[1179]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:21:53.783006 systemd[1]: Started polkit.service. Dec 13 14:21:53.784193 polkitd[1256]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:21:53.825588 systemd-hostnamed[1232]: Hostname set to (transient) Dec 13 14:21:53.830072 systemd-resolved[1147]: System hostname changed to 'ci-3510-3-6-a21253180a0a91dbaa8f.c.flatcar-212911.internal'. Dec 13 14:21:55.067170 sshd_keygen[1202]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:21:55.128750 systemd[1]: Finished sshd-keygen.service. Dec 13 14:21:55.143704 systemd[1]: Starting issuegen.service... Dec 13 14:21:55.158740 systemd[1]: Started kubelet.service. Dec 13 14:21:55.168422 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:21:55.168664 systemd[1]: Finished issuegen.service. Dec 13 14:21:55.179021 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:21:55.191669 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:21:55.204026 systemd[1]: Started getty@tty1.service. Dec 13 14:21:55.210984 locksmithd[1229]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:21:55.213983 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:21:55.223322 systemd[1]: Reached target getty.target. Dec 13 14:21:56.187646 kubelet[1277]: E1213 14:21:56.187595 1277 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:21:56.190575 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:21:56.190795 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:21:56.191187 systemd[1]: kubelet.service: Consumed 1.410s CPU time. Dec 13 14:21:58.162291 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 14:22:00.152297 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:22:00.173954 systemd-nspawn[1290]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 14:22:00.173954 systemd-nspawn[1290]: Press ^] three times within 1s to kill container. Dec 13 14:22:00.189283 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:22:00.278347 systemd[1]: Started oem-gce.service. Dec 13 14:22:00.278812 systemd[1]: Reached target multi-user.target. Dec 13 14:22:00.281064 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:22:00.292449 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:22:00.292733 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:22:00.292981 systemd[1]: Startup finished in 1.025s (kernel) + 7.272s (initrd) + 15.198s (userspace) = 23.496s. Dec 13 14:22:00.335799 systemd-nspawn[1290]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 14:22:00.335799 systemd-nspawn[1290]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 14:22:00.336099 systemd-nspawn[1290]: + /usr/bin/google_instance_setup Dec 13 14:22:00.978642 instance-setup[1296]: INFO Running google_set_multiqueue. Dec 13 14:22:00.993569 instance-setup[1296]: INFO Set channels for eth0 to 2. Dec 13 14:22:00.997536 instance-setup[1296]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 14:22:00.998999 instance-setup[1296]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 14:22:00.999474 instance-setup[1296]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 14:22:01.001057 instance-setup[1296]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 14:22:01.001478 instance-setup[1296]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 14:22:01.002869 instance-setup[1296]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 14:22:01.003352 instance-setup[1296]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 14:22:01.004861 instance-setup[1296]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 14:22:01.016684 instance-setup[1296]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 14:22:01.017074 instance-setup[1296]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 14:22:01.057899 systemd-nspawn[1290]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 14:22:01.398137 startup-script[1327]: INFO Starting startup scripts. Dec 13 14:22:01.412817 startup-script[1327]: INFO No startup scripts found in metadata. Dec 13 14:22:01.412995 startup-script[1327]: INFO Finished running startup scripts. Dec 13 14:22:01.449773 systemd-nspawn[1290]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 14:22:01.449773 systemd-nspawn[1290]: + daemon_pids=() Dec 13 14:22:01.450452 systemd-nspawn[1290]: + for d in accounts clock_skew network Dec 13 14:22:01.450452 systemd-nspawn[1290]: + daemon_pids+=($!) Dec 13 14:22:01.450452 systemd-nspawn[1290]: + for d in accounts clock_skew network Dec 13 14:22:01.450452 systemd-nspawn[1290]: + daemon_pids+=($!) Dec 13 14:22:01.450452 systemd-nspawn[1290]: + for d in accounts clock_skew network Dec 13 14:22:01.450718 systemd-nspawn[1290]: + daemon_pids+=($!) Dec 13 14:22:01.450828 systemd-nspawn[1290]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 14:22:01.450828 systemd-nspawn[1290]: + /usr/bin/systemd-notify --ready Dec 13 14:22:01.451348 systemd-nspawn[1290]: + /usr/bin/google_clock_skew_daemon Dec 13 14:22:01.451611 systemd-nspawn[1290]: + /usr/bin/google_network_daemon Dec 13 14:22:01.452175 systemd-nspawn[1290]: + /usr/bin/google_accounts_daemon Dec 13 14:22:01.504810 systemd-nspawn[1290]: + wait -n 36 37 38 Dec 13 14:22:01.627991 systemd[1]: Created slice system-sshd.slice. Dec 13 14:22:01.630998 systemd[1]: Started sshd@0-10.128.0.29:22-139.178.68.195:43074.service. Dec 13 14:22:01.965735 sshd[1335]: Accepted publickey for core from 139.178.68.195 port 43074 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:01.970400 sshd[1335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:01.990687 systemd[1]: Created slice user-500.slice. Dec 13 14:22:01.994872 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:22:02.006086 systemd-logind[1215]: New session 1 of user core. Dec 13 14:22:02.016643 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:22:02.019839 systemd[1]: Starting user@500.service... Dec 13 14:22:02.049137 (systemd)[1338]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:02.273156 systemd[1338]: Queued start job for default target default.target. Dec 13 14:22:02.274071 systemd[1338]: Reached target paths.target. Dec 13 14:22:02.274105 systemd[1338]: Reached target sockets.target. Dec 13 14:22:02.274131 systemd[1338]: Reached target timers.target. Dec 13 14:22:02.274154 systemd[1338]: Reached target basic.target. Dec 13 14:22:02.274263 systemd[1338]: Reached target default.target. Dec 13 14:22:02.274322 systemd[1338]: Startup finished in 208ms. Dec 13 14:22:02.274369 systemd[1]: Started user@500.service. Dec 13 14:22:02.276176 systemd[1]: Started session-1.scope. Dec 13 14:22:02.332135 google-clock-skew[1331]: INFO Starting Google Clock Skew daemon. Dec 13 14:22:02.352950 google-clock-skew[1331]: INFO Clock drift token has changed: 0. Dec 13 14:22:02.364142 systemd-nspawn[1290]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 14:22:02.364536 systemd-nspawn[1290]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 14:22:02.365612 google-clock-skew[1331]: WARNING Failed to sync system time with hardware clock. Dec 13 14:22:02.401727 groupadd[1352]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 14:22:02.406908 groupadd[1352]: group added to /etc/gshadow: name=google-sudoers Dec 13 14:22:02.411422 google-networking[1332]: INFO Starting Google Networking daemon. Dec 13 14:22:02.416020 groupadd[1352]: new group: name=google-sudoers, GID=1000 Dec 13 14:22:02.458410 google-accounts[1330]: INFO Starting Google Accounts daemon. Dec 13 14:22:02.504023 systemd[1]: Started sshd@1-10.128.0.29:22-139.178.68.195:43078.service. Dec 13 14:22:02.530979 google-accounts[1330]: WARNING OS Login not installed. Dec 13 14:22:02.532732 google-accounts[1330]: INFO Creating a new user account for 0. Dec 13 14:22:02.540306 systemd-nspawn[1290]: useradd: invalid user name '0': use --badname to ignore Dec 13 14:22:02.541157 google-accounts[1330]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 14:22:02.792216 sshd[1362]: Accepted publickey for core from 139.178.68.195 port 43078 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:02.793979 sshd[1362]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:02.800706 systemd-logind[1215]: New session 2 of user core. Dec 13 14:22:02.801561 systemd[1]: Started session-2.scope. Dec 13 14:22:03.004228 sshd[1362]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:03.009411 systemd[1]: sshd@1-10.128.0.29:22-139.178.68.195:43078.service: Deactivated successfully. Dec 13 14:22:03.010540 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:22:03.011477 systemd-logind[1215]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:22:03.012784 systemd-logind[1215]: Removed session 2. Dec 13 14:22:03.050206 systemd[1]: Started sshd@2-10.128.0.29:22-139.178.68.195:43086.service. Dec 13 14:22:03.334099 sshd[1371]: Accepted publickey for core from 139.178.68.195 port 43086 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:03.336402 sshd[1371]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:03.343653 systemd[1]: Started session-3.scope. Dec 13 14:22:03.344536 systemd-logind[1215]: New session 3 of user core. Dec 13 14:22:03.542144 sshd[1371]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:03.546496 systemd[1]: sshd@2-10.128.0.29:22-139.178.68.195:43086.service: Deactivated successfully. Dec 13 14:22:03.547615 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:22:03.548577 systemd-logind[1215]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:22:03.550294 systemd-logind[1215]: Removed session 3. Dec 13 14:22:03.588618 systemd[1]: Started sshd@3-10.128.0.29:22-139.178.68.195:43088.service. Dec 13 14:22:03.871773 sshd[1377]: Accepted publickey for core from 139.178.68.195 port 43088 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:03.873666 sshd[1377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:03.880101 systemd-logind[1215]: New session 4 of user core. Dec 13 14:22:03.880864 systemd[1]: Started session-4.scope. Dec 13 14:22:04.085756 sshd[1377]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:04.089768 systemd[1]: sshd@3-10.128.0.29:22-139.178.68.195:43088.service: Deactivated successfully. Dec 13 14:22:04.090872 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:22:04.091776 systemd-logind[1215]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:22:04.093038 systemd-logind[1215]: Removed session 4. Dec 13 14:22:04.131352 systemd[1]: Started sshd@4-10.128.0.29:22-139.178.68.195:43098.service. Dec 13 14:22:04.411716 sshd[1383]: Accepted publickey for core from 139.178.68.195 port 43098 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:04.413733 sshd[1383]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:04.421045 systemd[1]: Started session-5.scope. Dec 13 14:22:04.421929 systemd-logind[1215]: New session 5 of user core. Dec 13 14:22:04.608927 sudo[1386]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:22:04.609419 sudo[1386]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:04.619526 dbus-daemon[1179]: \xd0-\xa2g\x8cU: received setenforce notice (enforcing=-1436330704) Dec 13 14:22:04.621845 sudo[1386]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:04.665770 sshd[1383]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:04.670770 systemd[1]: sshd@4-10.128.0.29:22-139.178.68.195:43098.service: Deactivated successfully. Dec 13 14:22:04.671904 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:22:04.672844 systemd-logind[1215]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:22:04.674289 systemd-logind[1215]: Removed session 5. Dec 13 14:22:04.713649 systemd[1]: Started sshd@5-10.128.0.29:22-139.178.68.195:43108.service. Dec 13 14:22:05.000750 sshd[1390]: Accepted publickey for core from 139.178.68.195 port 43108 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:05.002846 sshd[1390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:05.009339 systemd-logind[1215]: New session 6 of user core. Dec 13 14:22:05.009757 systemd[1]: Started session-6.scope. Dec 13 14:22:05.181523 sudo[1394]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:22:05.181957 sudo[1394]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:05.186905 sudo[1394]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:05.200219 sudo[1393]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:22:05.200676 sudo[1393]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:05.214061 systemd[1]: Stopping audit-rules.service... Dec 13 14:22:05.214000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:22:05.217475 auditctl[1397]: No rules Dec 13 14:22:05.224275 kernel: kauditd_printk_skb: 211 callbacks suppressed Dec 13 14:22:05.224412 kernel: audit: type=1305 audit(1734099725.214:193): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:22:05.219723 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:22:05.219982 systemd[1]: Stopped audit-rules.service. Dec 13 14:22:05.222604 systemd[1]: Starting audit-rules.service... Dec 13 14:22:05.214000 audit[1397]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6c788350 a2=420 a3=0 items=0 ppid=1 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:05.264280 augenrules[1414]: No rules Dec 13 14:22:05.267604 kernel: audit: type=1300 audit(1734099725.214:193): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6c788350 a2=420 a3=0 items=0 ppid=1 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:05.266432 systemd[1]: Finished audit-rules.service. Dec 13 14:22:05.268037 sudo[1393]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:05.214000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:22:05.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.300348 kernel: audit: type=1327 audit(1734099725.214:193): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:22:05.300493 kernel: audit: type=1131 audit(1734099725.218:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.301272 kernel: audit: type=1130 audit(1734099725.265:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.324296 kernel: audit: type=1106 audit(1734099725.266:196): pid=1393 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.266000 audit[1393]: USER_END pid=1393 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.324847 sshd[1390]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:05.331204 systemd-logind[1215]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:22:05.333937 systemd[1]: sshd@5-10.128.0.29:22-139.178.68.195:43108.service: Deactivated successfully. Dec 13 14:22:05.335033 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:22:05.337200 systemd-logind[1215]: Removed session 6. Dec 13 14:22:05.267000 audit[1393]: CRED_DISP pid=1393 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.370198 kernel: audit: type=1104 audit(1734099725.267:197): pid=1393 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.376923 kernel: audit: type=1106 audit(1734099725.326:198): pid=1390 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:05.326000 audit[1390]: USER_END pid=1390 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:05.379449 systemd[1]: Started sshd@6-10.128.0.29:22-139.178.68.195:43118.service. Dec 13 14:22:05.326000 audit[1390]: CRED_DISP pid=1390 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:05.426404 kernel: audit: type=1104 audit(1734099725.326:199): pid=1390 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:05.426602 kernel: audit: type=1131 audit(1734099725.333:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.29:22-139.178.68.195:43108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.29:22-139.178.68.195:43108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.29:22-139.178.68.195:43118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.681000 audit[1420]: USER_ACCT pid=1420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:05.683360 sshd[1420]: Accepted publickey for core from 139.178.68.195 port 43118 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:05.684000 audit[1420]: CRED_ACQ pid=1420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:05.684000 audit[1420]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5df2c8d0 a2=3 a3=0 items=0 ppid=1 pid=1420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:05.684000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:05.686077 sshd[1420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:05.692800 systemd[1]: Started session-7.scope. Dec 13 14:22:05.693622 systemd-logind[1215]: New session 7 of user core. Dec 13 14:22:05.700000 audit[1420]: USER_START pid=1420 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:05.703000 audit[1422]: CRED_ACQ pid=1422 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:05.859000 audit[1423]: USER_ACCT pid=1423 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.860849 sudo[1423]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:22:05.859000 audit[1423]: CRED_REFR pid=1423 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.861347 sudo[1423]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:05.862000 audit[1423]: USER_START pid=1423 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:05.880182 systemd[1]: Starting coreos-metadata.service... Dec 13 14:22:05.929640 coreos-metadata[1427]: Dec 13 14:22:05.929 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Dec 13 14:22:05.931876 coreos-metadata[1427]: Dec 13 14:22:05.931 INFO Fetch successful Dec 13 14:22:05.932003 coreos-metadata[1427]: Dec 13 14:22:05.931 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Dec 13 14:22:05.933269 coreos-metadata[1427]: Dec 13 14:22:05.933 INFO Fetch successful Dec 13 14:22:05.933269 coreos-metadata[1427]: Dec 13 14:22:05.933 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Dec 13 14:22:05.934766 coreos-metadata[1427]: Dec 13 14:22:05.934 INFO Fetch successful Dec 13 14:22:05.934766 coreos-metadata[1427]: Dec 13 14:22:05.934 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Dec 13 14:22:05.935808 coreos-metadata[1427]: Dec 13 14:22:05.935 INFO Fetch successful Dec 13 14:22:05.946183 systemd[1]: Finished coreos-metadata.service. Dec 13 14:22:05.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:06.239285 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:22:06.239650 systemd[1]: Stopped kubelet.service. Dec 13 14:22:06.239731 systemd[1]: kubelet.service: Consumed 1.410s CPU time. Dec 13 14:22:06.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:06.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:06.241858 systemd[1]: Starting kubelet.service... Dec 13 14:22:06.498962 systemd[1]: Started kubelet.service. Dec 13 14:22:06.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:06.603140 kubelet[1447]: E1213 14:22:06.603078 1447 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:22:06.607860 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:22:06.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:22:06.608076 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:22:07.015292 systemd[1]: Stopped kubelet.service. Dec 13 14:22:07.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.019537 systemd[1]: Starting kubelet.service... Dec 13 14:22:07.061932 systemd[1]: Reloading. Dec 13 14:22:07.201145 /usr/lib/systemd/system-generators/torcx-generator[1497]: time="2024-12-13T14:22:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:22:07.201197 /usr/lib/systemd/system-generators/torcx-generator[1497]: time="2024-12-13T14:22:07Z" level=info msg="torcx already run" Dec 13 14:22:07.309907 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:22:07.309945 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:22:07.334085 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit: BPF prog-id=46 op=LOAD Dec 13 14:22:07.424000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit: BPF prog-id=47 op=LOAD Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.424000 audit: BPF prog-id=48 op=LOAD Dec 13 14:22:07.424000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:22:07.424000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit: BPF prog-id=49 op=LOAD Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.428000 audit: BPF prog-id=50 op=LOAD Dec 13 14:22:07.428000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:22:07.428000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit: BPF prog-id=51 op=LOAD Dec 13 14:22:07.429000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit: BPF prog-id=52 op=LOAD Dec 13 14:22:07.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.430000 audit: BPF prog-id=53 op=LOAD Dec 13 14:22:07.430000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:22:07.430000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:22:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit: BPF prog-id=54 op=LOAD Dec 13 14:22:07.432000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit: BPF prog-id=55 op=LOAD Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.432000 audit: BPF prog-id=56 op=LOAD Dec 13 14:22:07.433000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:22:07.433000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit: BPF prog-id=57 op=LOAD Dec 13 14:22:07.435000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit: BPF prog-id=58 op=LOAD Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.436000 audit: BPF prog-id=59 op=LOAD Dec 13 14:22:07.436000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:22:07.436000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:22:07.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.439000 audit: BPF prog-id=60 op=LOAD Dec 13 14:22:07.439000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.441000 audit: BPF prog-id=61 op=LOAD Dec 13 14:22:07.441000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:22:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.443000 audit: BPF prog-id=62 op=LOAD Dec 13 14:22:07.443000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:22:07.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:07.445000 audit: BPF prog-id=63 op=LOAD Dec 13 14:22:07.445000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:22:07.487824 systemd[1]: Started kubelet.service. Dec 13 14:22:07.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.497307 systemd[1]: Stopping kubelet.service... Dec 13 14:22:07.498192 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:22:07.498853 systemd[1]: Stopped kubelet.service. Dec 13 14:22:07.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.502092 systemd[1]: Starting kubelet.service... Dec 13 14:22:07.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.755000 systemd[1]: Started kubelet.service. Dec 13 14:22:07.816795 kubelet[1545]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:22:07.816795 kubelet[1545]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:22:07.816795 kubelet[1545]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:22:07.817426 kubelet[1545]: I1213 14:22:07.816877 1545 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:22:08.392556 kubelet[1545]: I1213 14:22:08.392502 1545 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:22:08.392556 kubelet[1545]: I1213 14:22:08.392535 1545 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:22:08.392869 kubelet[1545]: I1213 14:22:08.392831 1545 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:22:08.421263 kubelet[1545]: I1213 14:22:08.421192 1545 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:22:08.441121 kubelet[1545]: I1213 14:22:08.441052 1545 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:22:08.442622 kubelet[1545]: I1213 14:22:08.442552 1545 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:22:08.442862 kubelet[1545]: I1213 14:22:08.442611 1545 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.128.0.29","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:22:08.443068 kubelet[1545]: I1213 14:22:08.442872 1545 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:22:08.443068 kubelet[1545]: I1213 14:22:08.442892 1545 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:22:08.443068 kubelet[1545]: I1213 14:22:08.443051 1545 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:22:08.444566 kubelet[1545]: I1213 14:22:08.444525 1545 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:22:08.444566 kubelet[1545]: I1213 14:22:08.444559 1545 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:22:08.444764 kubelet[1545]: I1213 14:22:08.444594 1545 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:22:08.444764 kubelet[1545]: I1213 14:22:08.444618 1545 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:22:08.445306 kubelet[1545]: E1213 14:22:08.445258 1545 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:08.445409 kubelet[1545]: E1213 14:22:08.445343 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:08.451391 kubelet[1545]: I1213 14:22:08.451347 1545 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:22:08.453508 kubelet[1545]: I1213 14:22:08.453477 1545 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:22:08.453631 kubelet[1545]: W1213 14:22:08.453562 1545 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:22:08.454310 kubelet[1545]: I1213 14:22:08.454263 1545 server.go:1264] "Started kubelet" Dec 13 14:22:08.464663 kubelet[1545]: I1213 14:22:08.464587 1545 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:22:08.465977 kubelet[1545]: I1213 14:22:08.465899 1545 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:22:08.473304 kubelet[1545]: I1213 14:22:08.473188 1545 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:22:08.473784 kubelet[1545]: I1213 14:22:08.473756 1545 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:22:08.474000 audit[1545]: AVC avc: denied { mac_admin } for pid=1545 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:08.474000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:22:08.474000 audit[1545]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc6cc0 a1=c000bbc798 a2=c000bc6c90 a3=25 items=0 ppid=1 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:22:08.477646 kubelet[1545]: I1213 14:22:08.477607 1545 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:22:08.476000 audit[1545]: AVC avc: denied { mac_admin } for pid=1545 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:08.476000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:22:08.476000 audit[1545]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007f0e20 a1=c000493a40 a2=c0008d5a40 a3=25 items=0 ppid=1 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.476000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:22:08.478047 kubelet[1545]: I1213 14:22:08.477745 1545 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:22:08.478047 kubelet[1545]: I1213 14:22:08.477905 1545 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:22:08.489130 kubelet[1545]: I1213 14:22:08.489086 1545 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:22:08.490017 kubelet[1545]: I1213 14:22:08.489994 1545 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:22:08.490300 kubelet[1545]: I1213 14:22:08.490284 1545 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:22:08.492538 kubelet[1545]: E1213 14:22:08.492493 1545 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:22:08.494859 kubelet[1545]: I1213 14:22:08.494835 1545 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:22:08.495038 kubelet[1545]: I1213 14:22:08.495023 1545 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:22:08.495260 kubelet[1545]: I1213 14:22:08.495216 1545 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:22:08.515838 kubelet[1545]: E1213 14:22:08.515773 1545 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.29\" not found" node="10.128.0.29" Dec 13 14:22:08.524628 kubelet[1545]: I1213 14:22:08.524600 1545 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:22:08.525078 kubelet[1545]: I1213 14:22:08.525048 1545 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:22:08.525234 kubelet[1545]: I1213 14:22:08.525219 1545 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:22:08.532376 kubelet[1545]: I1213 14:22:08.530407 1545 policy_none.go:49] "None policy: Start" Dec 13 14:22:08.532376 kubelet[1545]: I1213 14:22:08.531746 1545 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:22:08.532376 kubelet[1545]: I1213 14:22:08.531779 1545 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:22:08.549094 systemd[1]: Created slice kubepods.slice. Dec 13 14:22:08.550000 audit[1558]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:08.550000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcae36f260 a2=0 a3=7ffcae36f24c items=0 ppid=1545 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:22:08.552000 audit[1563]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:08.552000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc73acbfe0 a2=0 a3=7ffc73acbfcc items=0 ppid=1545 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:22:08.560015 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:22:08.564420 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:22:08.570473 kubelet[1545]: I1213 14:22:08.570440 1545 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:22:08.570000 audit[1545]: AVC avc: denied { mac_admin } for pid=1545 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:08.570000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:22:08.570000 audit[1545]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc6000 a1=c000ccc540 a2=c000a7dfb0 a3=25 items=0 ppid=1 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.570000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:22:08.571215 kubelet[1545]: I1213 14:22:08.571186 1545 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:22:08.571552 kubelet[1545]: I1213 14:22:08.571498 1545 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:22:08.571784 kubelet[1545]: I1213 14:22:08.571768 1545 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:22:08.558000 audit[1565]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:08.558000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdc1ba9800 a2=0 a3=7ffdc1ba97ec items=0 ppid=1545 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.580518 kubelet[1545]: E1213 14:22:08.579715 1545 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.29\" not found" Dec 13 14:22:08.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:22:08.584000 audit[1570]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:08.584000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffda462bb60 a2=0 a3=7ffda462bb4c items=0 ppid=1545 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:22:08.591025 kubelet[1545]: I1213 14:22:08.590974 1545 kubelet_node_status.go:73] "Attempting to register node" node="10.128.0.29" Dec 13 14:22:08.600403 kubelet[1545]: I1213 14:22:08.600361 1545 kubelet_node_status.go:76] "Successfully registered node" node="10.128.0.29" Dec 13 14:22:08.611563 kubelet[1545]: I1213 14:22:08.611522 1545 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:22:08.612612 env[1210]: time="2024-12-13T14:22:08.612481811Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:22:08.613384 kubelet[1545]: I1213 14:22:08.613362 1545 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:22:08.647000 audit[1575]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:08.647000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffef7a48cd0 a2=0 a3=7ffef7a48cbc items=0 ppid=1545 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:22:08.651562 kubelet[1545]: I1213 14:22:08.651516 1545 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:22:08.652000 audit[1576]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1576 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:08.652000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffecd1d90a0 a2=0 a3=7ffecd1d908c items=0 ppid=1545 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:22:08.654924 kubelet[1545]: I1213 14:22:08.654892 1545 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:22:08.653000 audit[1577]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:08.653000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb44d65e0 a2=0 a3=10e3 items=0 ppid=1545 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:22:08.655337 kubelet[1545]: I1213 14:22:08.655312 1545 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:22:08.655442 kubelet[1545]: I1213 14:22:08.655355 1545 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:22:08.655495 kubelet[1545]: E1213 14:22:08.655434 1545 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:22:08.657000 audit[1578]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1578 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:08.657000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd78fcee20 a2=0 a3=7ffd78fcee0c items=0 ppid=1545 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:22:08.658000 audit[1579]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:08.658000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe6f923e20 a2=0 a3=7ffe6f923e0c items=0 ppid=1545 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:22:08.660000 audit[1581]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1581 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:08.660000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffec7daa40 a2=0 a3=7fffec7daa2c items=0 ppid=1545 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.660000 audit[1582]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:08.660000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0a7aedf0 a2=0 a3=7ffe0a7aeddc items=0 ppid=1545 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:22:08.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:22:08.662000 audit[1583]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1583 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:08.662000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffbefb1a10 a2=0 a3=7fffbefb19fc items=0 ppid=1545 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:08.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:22:08.780544 sudo[1423]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:08.779000 audit[1423]: USER_END pid=1423 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.779000 audit[1423]: CRED_DISP pid=1423 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.823654 sshd[1420]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:08.824000 audit[1420]: USER_END pid=1420 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:08.824000 audit[1420]: CRED_DISP pid=1420 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:08.828339 systemd[1]: sshd@6-10.128.0.29:22-139.178.68.195:43118.service: Deactivated successfully. Dec 13 14:22:08.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.29:22-139.178.68.195:43118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.829500 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:22:08.830441 systemd-logind[1215]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:22:08.831746 systemd-logind[1215]: Removed session 7. Dec 13 14:22:09.395552 kubelet[1545]: I1213 14:22:09.395478 1545 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:22:09.396339 kubelet[1545]: W1213 14:22:09.395837 1545 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:22:09.396339 kubelet[1545]: W1213 14:22:09.395892 1545 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:22:09.396481 kubelet[1545]: W1213 14:22:09.396345 1545 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:22:09.445838 kubelet[1545]: I1213 14:22:09.445771 1545 apiserver.go:52] "Watching apiserver" Dec 13 14:22:09.446099 kubelet[1545]: E1213 14:22:09.445776 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:09.454463 kubelet[1545]: I1213 14:22:09.454369 1545 topology_manager.go:215] "Topology Admit Handler" podUID="87d58046-202c-4ebe-8143-7dded9e0b685" podNamespace="calico-system" podName="calico-node-4jfwc" Dec 13 14:22:09.454717 kubelet[1545]: I1213 14:22:09.454560 1545 topology_manager.go:215] "Topology Admit Handler" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" podNamespace="calico-system" podName="csi-node-driver-m2zlw" Dec 13 14:22:09.454717 kubelet[1545]: I1213 14:22:09.454672 1545 topology_manager.go:215] "Topology Admit Handler" podUID="71a51f87-a3ee-461e-9b84-f7cd28fe55b0" podNamespace="kube-system" podName="kube-proxy-s6qcm" Dec 13 14:22:09.455979 kubelet[1545]: E1213 14:22:09.455783 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2zlw" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" Dec 13 14:22:09.465082 systemd[1]: Created slice kubepods-besteffort-pod71a51f87_a3ee_461e_9b84_f7cd28fe55b0.slice. Dec 13 14:22:09.483624 systemd[1]: Created slice kubepods-besteffort-pod87d58046_202c_4ebe_8143_7dded9e0b685.slice. Dec 13 14:22:09.491230 kubelet[1545]: I1213 14:22:09.491182 1545 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:22:09.498870 kubelet[1545]: I1213 14:22:09.498815 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k4frs\" (UniqueName: \"kubernetes.io/projected/87d58046-202c-4ebe-8143-7dded9e0b685-kube-api-access-k4frs\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.498870 kubelet[1545]: I1213 14:22:09.498877 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tqz7c\" (UniqueName: \"kubernetes.io/projected/71a51f87-a3ee-461e-9b84-f7cd28fe55b0-kube-api-access-tqz7c\") pod \"kube-proxy-s6qcm\" (UID: \"71a51f87-a3ee-461e-9b84-f7cd28fe55b0\") " pod="kube-system/kube-proxy-s6qcm" Dec 13 14:22:09.499192 kubelet[1545]: I1213 14:22:09.498910 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-bin-dir\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499192 kubelet[1545]: I1213 14:22:09.498947 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-var-run-calico\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499192 kubelet[1545]: I1213 14:22:09.498979 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-var-lib-calico\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499192 kubelet[1545]: I1213 14:22:09.499007 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/82085e4c-47c1-4e1f-bc1b-b95bae629a26-varrun\") pod \"csi-node-driver-m2zlw\" (UID: \"82085e4c-47c1-4e1f-bc1b-b95bae629a26\") " pod="calico-system/csi-node-driver-m2zlw" Dec 13 14:22:09.499192 kubelet[1545]: I1213 14:22:09.499032 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/71a51f87-a3ee-461e-9b84-f7cd28fe55b0-kube-proxy\") pod \"kube-proxy-s6qcm\" (UID: \"71a51f87-a3ee-461e-9b84-f7cd28fe55b0\") " pod="kube-system/kube-proxy-s6qcm" Dec 13 14:22:09.499476 kubelet[1545]: I1213 14:22:09.499056 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/71a51f87-a3ee-461e-9b84-f7cd28fe55b0-xtables-lock\") pod \"kube-proxy-s6qcm\" (UID: \"71a51f87-a3ee-461e-9b84-f7cd28fe55b0\") " pod="kube-system/kube-proxy-s6qcm" Dec 13 14:22:09.499476 kubelet[1545]: I1213 14:22:09.499084 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87d58046-202c-4ebe-8143-7dded9e0b685-tigera-ca-bundle\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499476 kubelet[1545]: I1213 14:22:09.499118 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/82085e4c-47c1-4e1f-bc1b-b95bae629a26-kubelet-dir\") pod \"csi-node-driver-m2zlw\" (UID: \"82085e4c-47c1-4e1f-bc1b-b95bae629a26\") " pod="calico-system/csi-node-driver-m2zlw" Dec 13 14:22:09.499476 kubelet[1545]: I1213 14:22:09.499144 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/82085e4c-47c1-4e1f-bc1b-b95bae629a26-socket-dir\") pod \"csi-node-driver-m2zlw\" (UID: \"82085e4c-47c1-4e1f-bc1b-b95bae629a26\") " pod="calico-system/csi-node-driver-m2zlw" Dec 13 14:22:09.499476 kubelet[1545]: I1213 14:22:09.499173 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ztqmx\" (UniqueName: \"kubernetes.io/projected/82085e4c-47c1-4e1f-bc1b-b95bae629a26-kube-api-access-ztqmx\") pod \"csi-node-driver-m2zlw\" (UID: \"82085e4c-47c1-4e1f-bc1b-b95bae629a26\") " pod="calico-system/csi-node-driver-m2zlw" Dec 13 14:22:09.499730 kubelet[1545]: I1213 14:22:09.499199 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-log-dir\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499730 kubelet[1545]: I1213 14:22:09.499231 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-xtables-lock\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499730 kubelet[1545]: I1213 14:22:09.499288 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-policysync\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499730 kubelet[1545]: I1213 14:22:09.499318 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/87d58046-202c-4ebe-8143-7dded9e0b685-node-certs\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499730 kubelet[1545]: I1213 14:22:09.499347 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-net-dir\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499965 kubelet[1545]: I1213 14:22:09.499382 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-flexvol-driver-host\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.499965 kubelet[1545]: I1213 14:22:09.499413 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/82085e4c-47c1-4e1f-bc1b-b95bae629a26-registration-dir\") pod \"csi-node-driver-m2zlw\" (UID: \"82085e4c-47c1-4e1f-bc1b-b95bae629a26\") " pod="calico-system/csi-node-driver-m2zlw" Dec 13 14:22:09.499965 kubelet[1545]: I1213 14:22:09.499442 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/71a51f87-a3ee-461e-9b84-f7cd28fe55b0-lib-modules\") pod \"kube-proxy-s6qcm\" (UID: \"71a51f87-a3ee-461e-9b84-f7cd28fe55b0\") " pod="kube-system/kube-proxy-s6qcm" Dec 13 14:22:09.499965 kubelet[1545]: I1213 14:22:09.499471 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-lib-modules\") pod \"calico-node-4jfwc\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " pod="calico-system/calico-node-4jfwc" Dec 13 14:22:09.606025 kubelet[1545]: E1213 14:22:09.605971 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.606025 kubelet[1545]: W1213 14:22:09.606015 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.606366 kubelet[1545]: E1213 14:22:09.606054 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.606502 kubelet[1545]: E1213 14:22:09.606480 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.606593 kubelet[1545]: W1213 14:22:09.606502 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.606593 kubelet[1545]: E1213 14:22:09.606534 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.607109 kubelet[1545]: E1213 14:22:09.607075 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.607109 kubelet[1545]: W1213 14:22:09.607105 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.607322 kubelet[1545]: E1213 14:22:09.607276 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.607612 kubelet[1545]: E1213 14:22:09.607576 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.607612 kubelet[1545]: W1213 14:22:09.607608 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.607792 kubelet[1545]: E1213 14:22:09.607750 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.608150 kubelet[1545]: E1213 14:22:09.608123 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.608150 kubelet[1545]: W1213 14:22:09.608148 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.608335 kubelet[1545]: E1213 14:22:09.608177 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.608600 kubelet[1545]: E1213 14:22:09.608577 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.608714 kubelet[1545]: W1213 14:22:09.608601 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.608714 kubelet[1545]: E1213 14:22:09.608625 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.609152 kubelet[1545]: E1213 14:22:09.609076 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.609391 kubelet[1545]: W1213 14:22:09.609155 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.609520 kubelet[1545]: E1213 14:22:09.609346 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.609963 kubelet[1545]: E1213 14:22:09.609933 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.609963 kubelet[1545]: W1213 14:22:09.609960 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.610137 kubelet[1545]: E1213 14:22:09.609987 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.610460 kubelet[1545]: E1213 14:22:09.610422 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.610460 kubelet[1545]: W1213 14:22:09.610458 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.610628 kubelet[1545]: E1213 14:22:09.610482 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.610943 kubelet[1545]: E1213 14:22:09.610920 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.610943 kubelet[1545]: W1213 14:22:09.610942 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.611150 kubelet[1545]: E1213 14:22:09.611124 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.611791 kubelet[1545]: E1213 14:22:09.611764 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.611885 kubelet[1545]: W1213 14:22:09.611794 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.611885 kubelet[1545]: E1213 14:22:09.611817 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.636088 kubelet[1545]: E1213 14:22:09.636039 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.636088 kubelet[1545]: W1213 14:22:09.636081 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.636418 kubelet[1545]: E1213 14:22:09.636124 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.650891 kubelet[1545]: E1213 14:22:09.647402 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.651195 kubelet[1545]: W1213 14:22:09.651151 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.651463 kubelet[1545]: E1213 14:22:09.651429 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.658599 kubelet[1545]: E1213 14:22:09.658539 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.658869 kubelet[1545]: W1213 14:22:09.658843 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.659026 kubelet[1545]: E1213 14:22:09.659005 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.663027 kubelet[1545]: E1213 14:22:09.662990 1545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:22:09.663027 kubelet[1545]: W1213 14:22:09.663019 1545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:22:09.663277 kubelet[1545]: E1213 14:22:09.663054 1545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:22:09.780985 env[1210]: time="2024-12-13T14:22:09.780900885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s6qcm,Uid:71a51f87-a3ee-461e-9b84-f7cd28fe55b0,Namespace:kube-system,Attempt:0,}" Dec 13 14:22:09.797514 env[1210]: time="2024-12-13T14:22:09.797427009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4jfwc,Uid:87d58046-202c-4ebe-8143-7dded9e0b685,Namespace:calico-system,Attempt:0,}" Dec 13 14:22:10.402063 env[1210]: time="2024-12-13T14:22:10.401981070Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:10.403774 env[1210]: time="2024-12-13T14:22:10.403714651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:10.410689 env[1210]: time="2024-12-13T14:22:10.410614277Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:10.412052 env[1210]: time="2024-12-13T14:22:10.411990641Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:10.412959 env[1210]: time="2024-12-13T14:22:10.412916968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:10.415785 env[1210]: time="2024-12-13T14:22:10.415722686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:10.416721 env[1210]: time="2024-12-13T14:22:10.416680638Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:10.420793 env[1210]: time="2024-12-13T14:22:10.420737399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:10.447079 kubelet[1545]: E1213 14:22:10.447029 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:10.454499 env[1210]: time="2024-12-13T14:22:10.448314209Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:10.454499 env[1210]: time="2024-12-13T14:22:10.448390127Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:10.454499 env[1210]: time="2024-12-13T14:22:10.448430783Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:10.454499 env[1210]: time="2024-12-13T14:22:10.450153034Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc pid=1613 runtime=io.containerd.runc.v2 Dec 13 14:22:10.455779 env[1210]: time="2024-12-13T14:22:10.455696833Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:10.455911 env[1210]: time="2024-12-13T14:22:10.455802496Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:10.455911 env[1210]: time="2024-12-13T14:22:10.455842282Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:10.456110 env[1210]: time="2024-12-13T14:22:10.456063063Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48e939fc1fbf89bf53a71d1a8d135b936e5be3faf842320636ed30179f54b834 pid=1630 runtime=io.containerd.runc.v2 Dec 13 14:22:10.478525 systemd[1]: Started cri-containerd-745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc.scope. Dec 13 14:22:10.497256 systemd[1]: Started cri-containerd-48e939fc1fbf89bf53a71d1a8d135b936e5be3faf842320636ed30179f54b834.scope. Dec 13 14:22:10.540574 kernel: kauditd_printk_skb: 280 callbacks suppressed Dec 13 14:22:10.540753 kernel: audit: type=1400 audit(1734099730.513:446): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.592111 kernel: audit: type=1400 audit(1734099730.513:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.592284 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:22:10.592352 kernel: audit: type=1400 audit(1734099730.513:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.592385 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:22:10.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.618042 kernel: audit: type=1400 audit(1734099730.513:449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.618250 kernel: audit: backlog limit exceeded Dec 13 14:22:10.618296 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:22:10.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.628083 kernel: audit: type=1400 audit(1734099730.513:450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.628215 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:22:10.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.539000 audit: BPF prog-id=64 op=LOAD Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1613 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734356337316234393764376636633665336234323261333965336566 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1613 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734356337316234393764376636633665336234323261333965336566 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.540000 audit: BPF prog-id=65 op=LOAD Dec 13 14:22:10.540000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00018f600 items=0 ppid=1613 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734356337316234393764376636633665336234323261333965336566 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit: BPF prog-id=66 op=LOAD Dec 13 14:22:10.541000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00018f648 items=0 ppid=1613 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734356337316234393764376636633665336234323261333965336566 Dec 13 14:22:10.541000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:22:10.541000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit: BPF prog-id=67 op=LOAD Dec 13 14:22:10.541000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00018fa58 items=0 ppid=1613 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734356337316234393764376636633665336234323261333965336566 Dec 13 14:22:10.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.666228 kubelet[1545]: E1213 14:22:10.661741 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2zlw" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" Dec 13 14:22:10.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.654000 audit: BPF prog-id=68 op=LOAD Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1630 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653933396663316662663839626635336137316431613864313335 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1630 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653933396663316662663839626635336137316431613864313335 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.663000 audit: BPF prog-id=69 op=LOAD Dec 13 14:22:10.663000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d7030 items=0 ppid=1630 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653933396663316662663839626635336137316431613864313335 Dec 13 14:22:10.664000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.664000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.664000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.664000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.664000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.664000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.664000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.664000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.664000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.664000 audit: BPF prog-id=70 op=LOAD Dec 13 14:22:10.664000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d7078 items=0 ppid=1630 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653933396663316662663839626635336137316431613864313335 Dec 13 14:22:10.664000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:22:10.665000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:10.665000 audit: BPF prog-id=71 op=LOAD Dec 13 14:22:10.665000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d7488 items=0 ppid=1630 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:10.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653933396663316662663839626635336137316431613864313335 Dec 13 14:22:10.673728 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount824725587.mount: Deactivated successfully. Dec 13 14:22:10.700521 env[1210]: time="2024-12-13T14:22:10.700455939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4jfwc,Uid:87d58046-202c-4ebe-8143-7dded9e0b685,Namespace:calico-system,Attempt:0,} returns sandbox id \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\"" Dec 13 14:22:10.706005 env[1210]: time="2024-12-13T14:22:10.704355384Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s6qcm,Uid:71a51f87-a3ee-461e-9b84-f7cd28fe55b0,Namespace:kube-system,Attempt:0,} returns sandbox id \"48e939fc1fbf89bf53a71d1a8d135b936e5be3faf842320636ed30179f54b834\"" Dec 13 14:22:10.706005 env[1210]: time="2024-12-13T14:22:10.704859521Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:22:11.447513 kubelet[1545]: E1213 14:22:11.447429 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:11.784583 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1516664200.mount: Deactivated successfully. Dec 13 14:22:11.944393 env[1210]: time="2024-12-13T14:22:11.944283150Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:11.947064 env[1210]: time="2024-12-13T14:22:11.947013692Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:11.949363 env[1210]: time="2024-12-13T14:22:11.949319006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:11.951682 env[1210]: time="2024-12-13T14:22:11.951633342Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:11.952586 env[1210]: time="2024-12-13T14:22:11.952511896Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:22:11.955171 env[1210]: time="2024-12-13T14:22:11.955131945Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:22:11.956588 env[1210]: time="2024-12-13T14:22:11.956533024Z" level=info msg="CreateContainer within sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:22:11.974316 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4137397220.mount: Deactivated successfully. Dec 13 14:22:11.983014 env[1210]: time="2024-12-13T14:22:11.982952360Z" level=info msg="CreateContainer within sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d\"" Dec 13 14:22:11.984310 env[1210]: time="2024-12-13T14:22:11.984178567Z" level=info msg="StartContainer for \"44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d\"" Dec 13 14:22:12.017788 systemd[1]: Started cri-containerd-44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d.scope. Dec 13 14:22:12.046000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.046000 audit[1697]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f04b7fc2b58 items=0 ppid=1613 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:12.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434613834643261373461646136306561303033626637623937363432 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.047000 audit: BPF prog-id=72 op=LOAD Dec 13 14:22:12.047000 audit[1697]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003be028 items=0 ppid=1613 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:12.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434613834643261373461646136306561303033626637623937363432 Dec 13 14:22:12.048000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.048000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.048000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.048000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.048000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.048000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.048000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.048000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.048000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.048000 audit: BPF prog-id=73 op=LOAD Dec 13 14:22:12.048000 audit[1697]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003be078 items=0 ppid=1613 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:12.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434613834643261373461646136306561303033626637623937363432 Dec 13 14:22:12.049000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:22:12.049000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:12.049000 audit: BPF prog-id=74 op=LOAD Dec 13 14:22:12.049000 audit[1697]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003be108 items=0 ppid=1613 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:12.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434613834643261373461646136306561303033626637623937363432 Dec 13 14:22:12.070854 env[1210]: time="2024-12-13T14:22:12.070795551Z" level=info msg="StartContainer for \"44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d\" returns successfully" Dec 13 14:22:12.086962 systemd[1]: cri-containerd-44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d.scope: Deactivated successfully. Dec 13 14:22:12.089000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:22:12.181002 env[1210]: time="2024-12-13T14:22:12.180865118Z" level=info msg="shim disconnected" id=44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d Dec 13 14:22:12.181002 env[1210]: time="2024-12-13T14:22:12.180958424Z" level=warning msg="cleaning up after shim disconnected" id=44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d namespace=k8s.io Dec 13 14:22:12.181002 env[1210]: time="2024-12-13T14:22:12.180977071Z" level=info msg="cleaning up dead shim" Dec 13 14:22:12.195265 env[1210]: time="2024-12-13T14:22:12.195191137Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1735 runtime=io.containerd.runc.v2\n" Dec 13 14:22:12.449941 kubelet[1545]: E1213 14:22:12.447839 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:12.656677 kubelet[1545]: E1213 14:22:12.656564 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2zlw" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" Dec 13 14:22:12.727424 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d-rootfs.mount: Deactivated successfully. Dec 13 14:22:13.213073 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3242362788.mount: Deactivated successfully. Dec 13 14:22:13.448973 kubelet[1545]: E1213 14:22:13.448892 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:13.927939 env[1210]: time="2024-12-13T14:22:13.927854818Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:13.931178 env[1210]: time="2024-12-13T14:22:13.931120459Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:13.933821 env[1210]: time="2024-12-13T14:22:13.933752927Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:13.936090 env[1210]: time="2024-12-13T14:22:13.936027178Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:13.936962 env[1210]: time="2024-12-13T14:22:13.936893279Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:22:13.939449 env[1210]: time="2024-12-13T14:22:13.939383418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:22:13.940818 env[1210]: time="2024-12-13T14:22:13.940767839Z" level=info msg="CreateContainer within sandbox \"48e939fc1fbf89bf53a71d1a8d135b936e5be3faf842320636ed30179f54b834\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:22:13.971763 env[1210]: time="2024-12-13T14:22:13.971697689Z" level=info msg="CreateContainer within sandbox \"48e939fc1fbf89bf53a71d1a8d135b936e5be3faf842320636ed30179f54b834\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2e7a649e5555edd1ec0d1156dcc440f28175068b4571ba2f159f3d12fece25c0\"" Dec 13 14:22:13.973170 env[1210]: time="2024-12-13T14:22:13.973095203Z" level=info msg="StartContainer for \"2e7a649e5555edd1ec0d1156dcc440f28175068b4571ba2f159f3d12fece25c0\"" Dec 13 14:22:14.007968 systemd[1]: Started cri-containerd-2e7a649e5555edd1ec0d1156dcc440f28175068b4571ba2f159f3d12fece25c0.scope. Dec 13 14:22:14.038000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.038000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f10633b8f68 items=0 ppid=1630 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265376136343965353535356564643165633064313135366463633434 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.039000 audit: BPF prog-id=75 op=LOAD Dec 13 14:22:14.039000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003945e8 items=0 ppid=1630 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265376136343965353535356564643165633064313135366463633434 Dec 13 14:22:14.040000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.040000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.040000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.040000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.040000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.040000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.040000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.040000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.040000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.040000 audit: BPF prog-id=76 op=LOAD Dec 13 14:22:14.040000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000394638 items=0 ppid=1630 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265376136343965353535356564643165633064313135366463633434 Dec 13 14:22:14.042000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:22:14.042000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:14.042000 audit: BPF prog-id=77 op=LOAD Dec 13 14:22:14.042000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003946c8 items=0 ppid=1630 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265376136343965353535356564643165633064313135366463633434 Dec 13 14:22:14.067276 env[1210]: time="2024-12-13T14:22:14.066756660Z" level=info msg="StartContainer for \"2e7a649e5555edd1ec0d1156dcc440f28175068b4571ba2f159f3d12fece25c0\" returns successfully" Dec 13 14:22:14.157000 audit[1812]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.157000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd916d7690 a2=0 a3=7ffd916d767c items=0 ppid=1772 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:22:14.159000 audit[1813]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.159000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf6d4d330 a2=0 a3=7ffdf6d4d31c items=0 ppid=1772 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:22:14.161000 audit[1814]: NETFILTER_CFG table=filter:16 family=10 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.161000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc98b79860 a2=0 a3=7ffc98b7984c items=0 ppid=1772 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:22:14.164000 audit[1815]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.164000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9c701550 a2=0 a3=7ffd9c70153c items=0 ppid=1772 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:22:14.165000 audit[1816]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.165000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd9912940 a2=0 a3=7fffd991292c items=0 ppid=1772 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:22:14.167000 audit[1817]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.167000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd30b99fe0 a2=0 a3=7ffd30b99fcc items=0 ppid=1772 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:22:14.260000 audit[1818]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.260000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffced12f070 a2=0 a3=7ffced12f05c items=0 ppid=1772 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:22:14.264000 audit[1820]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.264000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe759b73d0 a2=0 a3=7ffe759b73bc items=0 ppid=1772 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:22:14.270000 audit[1823]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.270000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda1827fc0 a2=0 a3=7ffda1827fac items=0 ppid=1772 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:22:14.272000 audit[1824]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.272000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6a21acb0 a2=0 a3=7fff6a21ac9c items=0 ppid=1772 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:22:14.276000 audit[1826]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.276000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3748ed40 a2=0 a3=7ffd3748ed2c items=0 ppid=1772 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:22:14.278000 audit[1827]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.278000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeca02bb0 a2=0 a3=7ffeeca02b9c items=0 ppid=1772 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:22:14.282000 audit[1829]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.282000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe090bb410 a2=0 a3=7ffe090bb3fc items=0 ppid=1772 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.282000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:22:14.290000 audit[1832]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.290000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefc8343d0 a2=0 a3=7ffefc8343bc items=0 ppid=1772 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:22:14.292000 audit[1833]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.292000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6f8d8c60 a2=0 a3=7ffc6f8d8c4c items=0 ppid=1772 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:22:14.297000 audit[1835]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.297000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb21416a0 a2=0 a3=7ffeb214168c items=0 ppid=1772 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:22:14.299000 audit[1836]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.299000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd642f3bf0 a2=0 a3=7ffd642f3bdc items=0 ppid=1772 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:22:14.303000 audit[1838]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.303000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc10955890 a2=0 a3=7ffc1095587c items=0 ppid=1772 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:22:14.310000 audit[1841]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.310000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff039ccaa0 a2=0 a3=7fff039cca8c items=0 ppid=1772 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:22:14.315000 audit[1844]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.315000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7d5d4c70 a2=0 a3=7ffc7d5d4c5c items=0 ppid=1772 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:22:14.317000 audit[1845]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.317000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd3849be0 a2=0 a3=7fffd3849bcc items=0 ppid=1772 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:22:14.322000 audit[1847]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.322000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff10709040 a2=0 a3=7fff1070902c items=0 ppid=1772 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:22:14.354000 audit[1852]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.354000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd270a5010 a2=0 a3=7ffd270a4ffc items=0 ppid=1772 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:22:14.356000 audit[1853]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.356000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfc86e5b0 a2=0 a3=7ffcfc86e59c items=0 ppid=1772 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:22:14.359000 audit[1855]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:14.359000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe7ae249a0 a2=0 a3=7ffe7ae2498c items=0 ppid=1772 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:22:14.388000 audit[1861]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:14.388000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc282afd0 a2=0 a3=7ffcc282afbc items=0 ppid=1772 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:14.417000 audit[1861]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:14.417000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffcc282afd0 a2=0 a3=7ffcc282afbc items=0 ppid=1772 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:14.420000 audit[1867]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.420000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc045c4700 a2=0 a3=7ffc045c46ec items=0 ppid=1772 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:22:14.424000 audit[1869]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.424000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe0d555520 a2=0 a3=7ffe0d55550c items=0 ppid=1772 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:22:14.430000 audit[1872]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.430000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff05ea9ea0 a2=0 a3=7fff05ea9e8c items=0 ppid=1772 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:22:14.432000 audit[1873]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.432000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea803b180 a2=0 a3=7ffea803b16c items=0 ppid=1772 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:22:14.436000 audit[1875]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.436000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc162f9350 a2=0 a3=7ffc162f933c items=0 ppid=1772 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:22:14.437000 audit[1876]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.437000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeea959800 a2=0 a3=7ffeea9597ec items=0 ppid=1772 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:22:14.441000 audit[1878]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.441000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed3b60b30 a2=0 a3=7ffed3b60b1c items=0 ppid=1772 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:22:14.447000 audit[1881]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.447000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc912e5ae0 a2=0 a3=7ffc912e5acc items=0 ppid=1772 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:22:14.450124 kubelet[1545]: E1213 14:22:14.450028 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:14.449000 audit[1882]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.449000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc09e89900 a2=0 a3=7ffc09e898ec items=0 ppid=1772 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:22:14.454000 audit[1884]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.454000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc42802090 a2=0 a3=7ffc4280207c items=0 ppid=1772 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:22:14.455000 audit[1885]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.455000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa64c4580 a2=0 a3=7fffa64c456c items=0 ppid=1772 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:22:14.459000 audit[1887]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.459000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc77d539b0 a2=0 a3=7ffc77d5399c items=0 ppid=1772 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:22:14.465000 audit[1890]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.465000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeae5eef00 a2=0 a3=7ffeae5eeeec items=0 ppid=1772 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:22:14.470000 audit[1893]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.470000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9a14c840 a2=0 a3=7ffe9a14c82c items=0 ppid=1772 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:22:14.472000 audit[1894]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.472000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe9849b800 a2=0 a3=7ffe9849b7ec items=0 ppid=1772 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:22:14.475000 audit[1896]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.475000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffec1296880 a2=0 a3=7ffec129686c items=0 ppid=1772 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:22:14.484000 audit[1899]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.484000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe0e819940 a2=0 a3=7ffe0e81992c items=0 ppid=1772 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:22:14.487000 audit[1900]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.487000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd197db310 a2=0 a3=7ffd197db2fc items=0 ppid=1772 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:22:14.491000 audit[1902]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.491000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc513f29b0 a2=0 a3=7ffc513f299c items=0 ppid=1772 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:22:14.494000 audit[1903]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.494000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdedec4d10 a2=0 a3=7ffdedec4cfc items=0 ppid=1772 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:22:14.497000 audit[1905]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.497000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe96935390 a2=0 a3=7ffe9693537c items=0 ppid=1772 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:22:14.502000 audit[1908]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:14.502000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff20191c20 a2=0 a3=7fff20191c0c items=0 ppid=1772 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:22:14.507000 audit[1910]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:22:14.507000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fffaf2bc7a0 a2=0 a3=7fffaf2bc78c items=0 ppid=1772 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.507000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:14.507000 audit[1910]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:22:14.507000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffaf2bc7a0 a2=0 a3=7fffaf2bc78c items=0 ppid=1772 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.507000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:14.656845 kubelet[1545]: E1213 14:22:14.656223 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2zlw" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" Dec 13 14:22:14.747886 kubelet[1545]: I1213 14:22:14.747790 1545 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-s6qcm" podStartSLOduration=3.518121573 podStartE2EDuration="6.747769225s" podCreationTimestamp="2024-12-13 14:22:08 +0000 UTC" firstStartedPulling="2024-12-13 14:22:10.708700708 +0000 UTC m=+2.946336170" lastFinishedPulling="2024-12-13 14:22:13.93834834 +0000 UTC m=+6.175983822" observedRunningTime="2024-12-13 14:22:14.747696532 +0000 UTC m=+6.985332018" watchObservedRunningTime="2024-12-13 14:22:14.747769225 +0000 UTC m=+6.985404710" Dec 13 14:22:15.451141 kubelet[1545]: E1213 14:22:15.451069 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:16.451387 kubelet[1545]: E1213 14:22:16.451261 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:16.658967 kubelet[1545]: E1213 14:22:16.657282 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2zlw" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" Dec 13 14:22:17.451559 kubelet[1545]: E1213 14:22:17.451446 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:18.144995 env[1210]: time="2024-12-13T14:22:18.144920592Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:18.148689 env[1210]: time="2024-12-13T14:22:18.148626393Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:18.152037 env[1210]: time="2024-12-13T14:22:18.151978078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:18.154748 env[1210]: time="2024-12-13T14:22:18.154689692Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:18.155584 env[1210]: time="2024-12-13T14:22:18.155503169Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:22:18.160417 env[1210]: time="2024-12-13T14:22:18.160340403Z" level=info msg="CreateContainer within sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:22:18.182331 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1135643012.mount: Deactivated successfully. Dec 13 14:22:18.193909 env[1210]: time="2024-12-13T14:22:18.193822153Z" level=info msg="CreateContainer within sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8\"" Dec 13 14:22:18.194863 env[1210]: time="2024-12-13T14:22:18.194815744Z" level=info msg="StartContainer for \"612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8\"" Dec 13 14:22:18.233800 systemd[1]: run-containerd-runc-k8s.io-612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8-runc.edsXao.mount: Deactivated successfully. Dec 13 14:22:18.241392 systemd[1]: Started cri-containerd-612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8.scope. Dec 13 14:22:18.302133 kernel: kauditd_printk_skb: 348 callbacks suppressed Dec 13 14:22:18.302338 kernel: audit: type=1400 audit(1734099738.274:544): avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9b3436a848 items=0 ppid=1613 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.336261 kernel: audit: type=1300 audit(1734099738.274:544): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9b3436a848 items=0 ppid=1613 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631326463393666626466633233366465303363336638613731356161 Dec 13 14:22:18.367437 env[1210]: time="2024-12-13T14:22:18.367366208Z" level=info msg="StartContainer for \"612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8\" returns successfully" Dec 13 14:22:18.370310 kernel: audit: type=1327 audit(1734099738.274:544): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631326463393666626466633233366465303363336638613731356161 Dec 13 14:22:18.370480 kernel: audit: type=1400 audit(1734099738.274:545): avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.412829 kernel: audit: type=1400 audit(1734099738.274:545): avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.412998 kernel: audit: type=1400 audit(1734099738.274:545): avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.452112 kubelet[1545]: E1213 14:22:18.452049 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.477004 kernel: audit: type=1400 audit(1734099738.274:545): avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.477159 kernel: audit: type=1400 audit(1734099738.274:545): avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.477220 kernel: audit: type=1400 audit(1734099738.274:545): avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.519068 kernel: audit: type=1400 audit(1734099738.274:545): avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.274000 audit: BPF prog-id=78 op=LOAD Dec 13 14:22:18.274000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003aa578 items=0 ppid=1613 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631326463393666626466633233366465303363336638613731356161 Dec 13 14:22:18.279000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.279000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.279000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.279000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.279000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.279000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.279000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.279000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.279000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.279000 audit: BPF prog-id=79 op=LOAD Dec 13 14:22:18.279000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003aa5c8 items=0 ppid=1613 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631326463393666626466633233366465303363336638613731356161 Dec 13 14:22:18.300000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:22:18.300000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:18.300000 audit: BPF prog-id=80 op=LOAD Dec 13 14:22:18.300000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003aa658 items=0 ppid=1613 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631326463393666626466633233366465303363336638613731356161 Dec 13 14:22:18.656838 kubelet[1545]: E1213 14:22:18.656778 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2zlw" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" Dec 13 14:22:19.328087 env[1210]: time="2024-12-13T14:22:19.328000967Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:22:19.331105 systemd[1]: cri-containerd-612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8.scope: Deactivated successfully. Dec 13 14:22:19.334000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:22:19.362813 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8-rootfs.mount: Deactivated successfully. Dec 13 14:22:19.369275 kubelet[1545]: I1213 14:22:19.369143 1545 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:22:19.453400 kubelet[1545]: E1213 14:22:19.453298 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:20.454270 kubelet[1545]: E1213 14:22:20.454196 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:20.494830 env[1210]: time="2024-12-13T14:22:20.494764720Z" level=info msg="shim disconnected" id=612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8 Dec 13 14:22:20.494830 env[1210]: time="2024-12-13T14:22:20.494828916Z" level=warning msg="cleaning up after shim disconnected" id=612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8 namespace=k8s.io Dec 13 14:22:20.495566 env[1210]: time="2024-12-13T14:22:20.494843553Z" level=info msg="cleaning up dead shim" Dec 13 14:22:20.506921 env[1210]: time="2024-12-13T14:22:20.506845503Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1959 runtime=io.containerd.runc.v2\n" Dec 13 14:22:20.663251 systemd[1]: Created slice kubepods-besteffort-pod82085e4c_47c1_4e1f_bc1b_b95bae629a26.slice. Dec 13 14:22:20.666878 env[1210]: time="2024-12-13T14:22:20.666821925Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m2zlw,Uid:82085e4c-47c1-4e1f-bc1b-b95bae629a26,Namespace:calico-system,Attempt:0,}" Dec 13 14:22:20.757303 env[1210]: time="2024-12-13T14:22:20.757224833Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:22:20.773547 env[1210]: time="2024-12-13T14:22:20.773434935Z" level=error msg="Failed to destroy network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:20.779686 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2-shm.mount: Deactivated successfully. Dec 13 14:22:20.781579 env[1210]: time="2024-12-13T14:22:20.781475309Z" level=error msg="encountered an error cleaning up failed sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:20.781760 env[1210]: time="2024-12-13T14:22:20.781588513Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m2zlw,Uid:82085e4c-47c1-4e1f-bc1b-b95bae629a26,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:20.782068 kubelet[1545]: E1213 14:22:20.781981 1545 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:20.782201 kubelet[1545]: E1213 14:22:20.782102 1545 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m2zlw" Dec 13 14:22:20.782201 kubelet[1545]: E1213 14:22:20.782137 1545 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m2zlw" Dec 13 14:22:20.782544 kubelet[1545]: E1213 14:22:20.782197 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-m2zlw_calico-system(82085e4c-47c1-4e1f-bc1b-b95bae629a26)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-m2zlw_calico-system(82085e4c-47c1-4e1f-bc1b-b95bae629a26)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m2zlw" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" Dec 13 14:22:21.455154 kubelet[1545]: E1213 14:22:21.455067 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:21.640013 kubelet[1545]: I1213 14:22:21.638897 1545 topology_manager.go:215] "Topology Admit Handler" podUID="6fb560e5-e746-43c8-bf28-29c183d9648d" podNamespace="default" podName="nginx-deployment-85f456d6dd-rgts5" Dec 13 14:22:21.650466 systemd[1]: Created slice kubepods-besteffort-pod6fb560e5_e746_43c8_bf28_29c183d9648d.slice. Dec 13 14:22:21.726350 kubelet[1545]: I1213 14:22:21.726117 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hqzqz\" (UniqueName: \"kubernetes.io/projected/6fb560e5-e746-43c8-bf28-29c183d9648d-kube-api-access-hqzqz\") pod \"nginx-deployment-85f456d6dd-rgts5\" (UID: \"6fb560e5-e746-43c8-bf28-29c183d9648d\") " pod="default/nginx-deployment-85f456d6dd-rgts5" Dec 13 14:22:21.760046 kubelet[1545]: I1213 14:22:21.759986 1545 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:22:21.762212 env[1210]: time="2024-12-13T14:22:21.762076862Z" level=info msg="StopPodSandbox for \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\"" Dec 13 14:22:21.863786 env[1210]: time="2024-12-13T14:22:21.863676742Z" level=error msg="StopPodSandbox for \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\" failed" error="failed to destroy network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:21.864152 kubelet[1545]: E1213 14:22:21.864095 1545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:22:21.864359 kubelet[1545]: E1213 14:22:21.864192 1545 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2"} Dec 13 14:22:21.864359 kubelet[1545]: E1213 14:22:21.864330 1545 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"82085e4c-47c1-4e1f-bc1b-b95bae629a26\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:21.864557 kubelet[1545]: E1213 14:22:21.864374 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"82085e4c-47c1-4e1f-bc1b-b95bae629a26\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m2zlw" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" Dec 13 14:22:21.961086 env[1210]: time="2024-12-13T14:22:21.961009109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-rgts5,Uid:6fb560e5-e746-43c8-bf28-29c183d9648d,Namespace:default,Attempt:0,}" Dec 13 14:22:22.144812 env[1210]: time="2024-12-13T14:22:22.144706479Z" level=error msg="Failed to destroy network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:22.149926 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f-shm.mount: Deactivated successfully. Dec 13 14:22:22.150752 env[1210]: time="2024-12-13T14:22:22.150667482Z" level=error msg="encountered an error cleaning up failed sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:22.151036 env[1210]: time="2024-12-13T14:22:22.150986470Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-rgts5,Uid:6fb560e5-e746-43c8-bf28-29c183d9648d,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:22.153150 kubelet[1545]: E1213 14:22:22.151813 1545 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:22.153150 kubelet[1545]: E1213 14:22:22.152222 1545 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-rgts5" Dec 13 14:22:22.153150 kubelet[1545]: E1213 14:22:22.152421 1545 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-rgts5" Dec 13 14:22:22.153526 kubelet[1545]: E1213 14:22:22.152519 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-rgts5_default(6fb560e5-e746-43c8-bf28-29c183d9648d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-rgts5_default(6fb560e5-e746-43c8-bf28-29c183d9648d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-rgts5" podUID="6fb560e5-e746-43c8-bf28-29c183d9648d" Dec 13 14:22:22.457180 kubelet[1545]: E1213 14:22:22.456191 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:22.763306 kubelet[1545]: I1213 14:22:22.763256 1545 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:22:22.764261 env[1210]: time="2024-12-13T14:22:22.764173944Z" level=info msg="StopPodSandbox for \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\"" Dec 13 14:22:22.806782 env[1210]: time="2024-12-13T14:22:22.806698944Z" level=error msg="StopPodSandbox for \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\" failed" error="failed to destroy network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:22.807072 kubelet[1545]: E1213 14:22:22.807020 1545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:22:22.807329 kubelet[1545]: E1213 14:22:22.807091 1545 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f"} Dec 13 14:22:22.807329 kubelet[1545]: E1213 14:22:22.807149 1545 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6fb560e5-e746-43c8-bf28-29c183d9648d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:22.807329 kubelet[1545]: E1213 14:22:22.807186 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6fb560e5-e746-43c8-bf28-29c183d9648d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-rgts5" podUID="6fb560e5-e746-43c8-bf28-29c183d9648d" Dec 13 14:22:23.456940 kubelet[1545]: E1213 14:22:23.456880 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:23.861150 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:22:23.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:23.868290 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:22:23.868415 kernel: audit: type=1131 audit(1734099743.861:551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:23.907000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:22:23.907000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:22:23.921811 kernel: audit: type=1334 audit(1734099743.907:552): prog-id=53 op=UNLOAD Dec 13 14:22:23.921970 kernel: audit: type=1334 audit(1734099743.907:553): prog-id=52 op=UNLOAD Dec 13 14:22:23.922026 kernel: audit: type=1334 audit(1734099743.907:554): prog-id=51 op=UNLOAD Dec 13 14:22:23.907000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:22:24.457289 kubelet[1545]: E1213 14:22:24.457194 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:25.458182 kubelet[1545]: E1213 14:22:25.458105 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:26.459201 kubelet[1545]: E1213 14:22:26.459110 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:27.459970 kubelet[1545]: E1213 14:22:27.459917 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:27.847805 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3418233236.mount: Deactivated successfully. Dec 13 14:22:27.892443 env[1210]: time="2024-12-13T14:22:27.892358532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:27.895620 env[1210]: time="2024-12-13T14:22:27.895549221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:27.897881 env[1210]: time="2024-12-13T14:22:27.897837497Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:27.899979 env[1210]: time="2024-12-13T14:22:27.899935242Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:27.900655 env[1210]: time="2024-12-13T14:22:27.900598006Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:22:27.926847 env[1210]: time="2024-12-13T14:22:27.926755248Z" level=info msg="CreateContainer within sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:22:27.948505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2467990845.mount: Deactivated successfully. Dec 13 14:22:27.956566 env[1210]: time="2024-12-13T14:22:27.956496941Z" level=info msg="CreateContainer within sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\"" Dec 13 14:22:27.957715 env[1210]: time="2024-12-13T14:22:27.957663593Z" level=info msg="StartContainer for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\"" Dec 13 14:22:27.984649 systemd[1]: Started cri-containerd-a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323.scope. Dec 13 14:22:28.011000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.011000 audit[2089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f39000a7578 items=0 ppid=1613 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:28.065181 kernel: audit: type=1400 audit(1734099748.011:555): avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.065358 kernel: audit: type=1300 audit(1734099748.011:555): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f39000a7578 items=0 ppid=1613 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:28.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303731663839636666393735336464346230653335303438313732 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.114839 kernel: audit: type=1327 audit(1734099748.011:555): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303731663839636666393735336464346230653335303438313732 Dec 13 14:22:28.115015 kernel: audit: type=1400 audit(1734099748.019:556): avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.115063 kernel: audit: type=1400 audit(1734099748.019:556): avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.156664 kernel: audit: type=1400 audit(1734099748.019:556): avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.019000 audit: BPF prog-id=81 op=LOAD Dec 13 14:22:28.019000 audit[2089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00039b838 items=0 ppid=1613 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:28.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303731663839636666393735336464346230653335303438313732 Dec 13 14:22:28.032000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.032000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.032000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.032000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.032000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.032000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.032000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.032000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.032000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.032000 audit: BPF prog-id=82 op=LOAD Dec 13 14:22:28.032000 audit[2089]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00039b888 items=0 ppid=1613 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:28.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303731663839636666393735336464346230653335303438313732 Dec 13 14:22:28.094000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:22:28.094000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:28.094000 audit: BPF prog-id=83 op=LOAD Dec 13 14:22:28.094000 audit[2089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00039b918 items=0 ppid=1613 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:28.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303731663839636666393735336464346230653335303438313732 Dec 13 14:22:28.177400 env[1210]: time="2024-12-13T14:22:28.177336405Z" level=info msg="StartContainer for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\" returns successfully" Dec 13 14:22:28.294433 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:22:28.294618 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:22:28.324507 systemd[1]: cri-containerd-a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323.scope: Deactivated successfully. Dec 13 14:22:28.328000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:22:28.445228 kubelet[1545]: E1213 14:22:28.445070 1545 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:28.460578 kubelet[1545]: E1213 14:22:28.460521 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:28.807646 kubelet[1545]: I1213 14:22:28.807495 1545 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-4jfwc" podStartSLOduration=3.609329673 podStartE2EDuration="20.807465607s" podCreationTimestamp="2024-12-13 14:22:08 +0000 UTC" firstStartedPulling="2024-12-13 14:22:10.703746388 +0000 UTC m=+2.941381872" lastFinishedPulling="2024-12-13 14:22:27.901882334 +0000 UTC m=+20.139517806" observedRunningTime="2024-12-13 14:22:28.80690387 +0000 UTC m=+21.044539354" watchObservedRunningTime="2024-12-13 14:22:28.807465607 +0000 UTC m=+21.045101095" Dec 13 14:22:29.460802 kubelet[1545]: E1213 14:22:29.460734 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:29.903262 env[1210]: time="2024-12-13T14:22:29.903156715Z" level=info msg="shim disconnected" id=a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 Dec 13 14:22:29.904750 env[1210]: time="2024-12-13T14:22:29.904711085Z" level=warning msg="cleaning up after shim disconnected" id=a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 namespace=k8s.io Dec 13 14:22:29.904971 env[1210]: time="2024-12-13T14:22:29.904942339Z" level=info msg="cleaning up dead shim" Dec 13 14:22:29.905809 env[1210]: time="2024-12-13T14:22:29.905719677Z" level=error msg="ExecSync for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"1851ccac151c020f2f492309dafd42a4f2893ae2fc3c4bfd1457748193712e19\": task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" Dec 13 14:22:29.906496 kubelet[1545]: E1213 14:22:29.906406 1545 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"1851ccac151c020f2f492309dafd42a4f2893ae2fc3c4bfd1457748193712e19\": task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" containerID="a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:22:29.908545 env[1210]: time="2024-12-13T14:22:29.908472493Z" level=error msg="ExecSync for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" Dec 13 14:22:29.908827 kubelet[1545]: E1213 14:22:29.908768 1545 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" containerID="a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:22:29.910546 env[1210]: time="2024-12-13T14:22:29.910481638Z" level=error msg="ExecSync for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" Dec 13 14:22:29.910749 kubelet[1545]: E1213 14:22:29.910697 1545 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" containerID="a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:22:29.912709 env[1210]: time="2024-12-13T14:22:29.912648448Z" level=error msg="ExecSync for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" Dec 13 14:22:29.912889 kubelet[1545]: E1213 14:22:29.912840 1545 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" containerID="a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:22:29.914449 env[1210]: time="2024-12-13T14:22:29.914394232Z" level=error msg="ExecSync for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" Dec 13 14:22:29.914620 kubelet[1545]: E1213 14:22:29.914577 1545 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" containerID="a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:22:29.916338 env[1210]: time="2024-12-13T14:22:29.916278981Z" level=error msg="ExecSync for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" Dec 13 14:22:29.916497 kubelet[1545]: E1213 14:22:29.916457 1545 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323 not found: not found" containerID="a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:22:29.925611 env[1210]: time="2024-12-13T14:22:29.925543767Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2140 runtime=io.containerd.runc.v2\n" Dec 13 14:22:30.460921 kubelet[1545]: E1213 14:22:30.460856 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:30.794489 kubelet[1545]: I1213 14:22:30.794432 1545 scope.go:117] "RemoveContainer" containerID="a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323" Dec 13 14:22:30.799161 env[1210]: time="2024-12-13T14:22:30.799063661Z" level=info msg="CreateContainer within sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 14:22:30.828810 env[1210]: time="2024-12-13T14:22:30.828672263Z" level=info msg="CreateContainer within sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e\"" Dec 13 14:22:30.830814 env[1210]: time="2024-12-13T14:22:30.830670175Z" level=info msg="StartContainer for \"364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e\"" Dec 13 14:22:30.880275 systemd[1]: run-containerd-runc-k8s.io-364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e-runc.yaYLjn.mount: Deactivated successfully. Dec 13 14:22:30.890391 systemd[1]: Started cri-containerd-364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e.scope. Dec 13 14:22:30.920000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.947893 kernel: kauditd_printk_skb: 38 callbacks suppressed Dec 13 14:22:30.948182 kernel: audit: type=1400 audit(1734099750.920:562): avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.920000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6c01734cb8 items=0 ppid=1613 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:30.981343 kernel: audit: type=1300 audit(1734099750.920:562): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6c01734cb8 items=0 ppid=1613 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:30.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346435316366393664336639393736653930646166383138303833 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:31.031914 kernel: audit: type=1327 audit(1734099750.920:562): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346435316366393664336639393736653930646166383138303833 Dec 13 14:22:31.032169 kernel: audit: type=1400 audit(1734099750.924:563): avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:31.052587 kernel: audit: type=1400 audit(1734099750.924:563): avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:31.052757 kernel: audit: type=1400 audit(1734099750.924:563): avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:31.120212 kernel: audit: type=1400 audit(1734099750.924:563): avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:31.120473 kernel: audit: type=1400 audit(1734099750.924:563): avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:31.120519 kernel: audit: type=1400 audit(1734099750.924:563): avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:31.138374 kernel: audit: type=1400 audit(1734099750.924:563): avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.924000 audit: BPF prog-id=84 op=LOAD Dec 13 14:22:30.924000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00041a778 items=0 ppid=1613 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:30.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346435316366393664336639393736653930646166383138303833 Dec 13 14:22:30.946000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.946000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.946000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.946000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.946000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.946000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.946000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.946000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.946000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.946000 audit: BPF prog-id=85 op=LOAD Dec 13 14:22:30.946000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00041a7c8 items=0 ppid=1613 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:30.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346435316366393664336639393736653930646166383138303833 Dec 13 14:22:30.979000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:22:30.979000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:30.979000 audit: BPF prog-id=86 op=LOAD Dec 13 14:22:30.979000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00041a858 items=0 ppid=1613 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:30.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346435316366393664336639393736653930646166383138303833 Dec 13 14:22:31.163719 env[1210]: time="2024-12-13T14:22:31.161487118Z" level=info msg="StartContainer for \"364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e\" returns successfully" Dec 13 14:22:31.242657 systemd[1]: cri-containerd-364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e.scope: Deactivated successfully. Dec 13 14:22:31.245000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:22:31.285927 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e-rootfs.mount: Deactivated successfully. Dec 13 14:22:31.292372 env[1210]: time="2024-12-13T14:22:31.292162473Z" level=info msg="shim disconnected" id=364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e Dec 13 14:22:31.292372 env[1210]: time="2024-12-13T14:22:31.292365174Z" level=warning msg="cleaning up after shim disconnected" id=364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e namespace=k8s.io Dec 13 14:22:31.292372 env[1210]: time="2024-12-13T14:22:31.292388786Z" level=info msg="cleaning up dead shim" Dec 13 14:22:31.315177 env[1210]: time="2024-12-13T14:22:31.312567814Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2204 runtime=io.containerd.runc.v2\n" Dec 13 14:22:31.461604 kubelet[1545]: E1213 14:22:31.461529 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:31.801641 kubelet[1545]: I1213 14:22:31.799909 1545 scope.go:117] "RemoveContainer" containerID="a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323" Dec 13 14:22:31.801641 kubelet[1545]: I1213 14:22:31.800405 1545 scope.go:117] "RemoveContainer" containerID="364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e" Dec 13 14:22:31.801641 kubelet[1545]: E1213 14:22:31.801006 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-4jfwc_calico-system(87d58046-202c-4ebe-8143-7dded9e0b685)\"" pod="calico-system/calico-node-4jfwc" podUID="87d58046-202c-4ebe-8143-7dded9e0b685" Dec 13 14:22:31.802559 env[1210]: time="2024-12-13T14:22:31.802505410Z" level=info msg="RemoveContainer for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\"" Dec 13 14:22:31.807715 env[1210]: time="2024-12-13T14:22:31.807642955Z" level=info msg="RemoveContainer for \"a4071f89cff9753dd4b0e35048172a9a3dd053678d6d048c799ced577c4a3323\" returns successfully" Dec 13 14:22:32.462569 kubelet[1545]: E1213 14:22:32.462495 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:33.463420 kubelet[1545]: E1213 14:22:33.463347 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:34.463672 kubelet[1545]: E1213 14:22:34.463601 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:34.657466 env[1210]: time="2024-12-13T14:22:34.657392789Z" level=info msg="StopPodSandbox for \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\"" Dec 13 14:22:34.700812 env[1210]: time="2024-12-13T14:22:34.700702635Z" level=error msg="StopPodSandbox for \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\" failed" error="failed to destroy network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:34.701410 kubelet[1545]: E1213 14:22:34.701337 1545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:22:34.701599 kubelet[1545]: E1213 14:22:34.701439 1545 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2"} Dec 13 14:22:34.701599 kubelet[1545]: E1213 14:22:34.701504 1545 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"82085e4c-47c1-4e1f-bc1b-b95bae629a26\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:34.701599 kubelet[1545]: E1213 14:22:34.701553 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"82085e4c-47c1-4e1f-bc1b-b95bae629a26\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m2zlw" podUID="82085e4c-47c1-4e1f-bc1b-b95bae629a26" Dec 13 14:22:35.464363 kubelet[1545]: E1213 14:22:35.464254 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:35.921536 env[1210]: time="2024-12-13T14:22:35.921461201Z" level=info msg="StopPodSandbox for \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\"" Dec 13 14:22:35.922289 env[1210]: time="2024-12-13T14:22:35.921577295Z" level=info msg="Container to stop \"44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:22:35.922289 env[1210]: time="2024-12-13T14:22:35.921601955Z" level=info msg="Container to stop \"612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:22:35.922289 env[1210]: time="2024-12-13T14:22:35.921623299Z" level=info msg="Container to stop \"364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:22:35.926150 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc-shm.mount: Deactivated successfully. Dec 13 14:22:35.939091 systemd[1]: cri-containerd-745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc.scope: Deactivated successfully. Dec 13 14:22:35.938000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:22:35.947045 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:22:35.947334 kernel: audit: type=1334 audit(1734099755.938:569): prog-id=64 op=UNLOAD Dec 13 14:22:35.956000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:22:35.966440 kernel: audit: type=1334 audit(1734099755.956:570): prog-id=67 op=UNLOAD Dec 13 14:22:35.993025 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc-rootfs.mount: Deactivated successfully. Dec 13 14:22:36.012461 env[1210]: time="2024-12-13T14:22:36.012304632Z" level=info msg="shim disconnected" id=745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc Dec 13 14:22:36.012886 env[1210]: time="2024-12-13T14:22:36.012513965Z" level=warning msg="cleaning up after shim disconnected" id=745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc namespace=k8s.io Dec 13 14:22:36.012886 env[1210]: time="2024-12-13T14:22:36.012561690Z" level=info msg="cleaning up dead shim" Dec 13 14:22:36.028056 env[1210]: time="2024-12-13T14:22:36.027957787Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2254 runtime=io.containerd.runc.v2\n" Dec 13 14:22:36.028836 env[1210]: time="2024-12-13T14:22:36.028764812Z" level=info msg="TearDown network for sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" successfully" Dec 13 14:22:36.028836 env[1210]: time="2024-12-13T14:22:36.028816359Z" level=info msg="StopPodSandbox for \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" returns successfully" Dec 13 14:22:36.136600 kubelet[1545]: I1213 14:22:36.136508 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-var-lib-calico\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137040 kubelet[1545]: I1213 14:22:36.137013 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-policysync\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137207 kubelet[1545]: I1213 14:22:36.137184 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-bin-dir\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137350 kubelet[1545]: I1213 14:22:36.137233 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87d58046-202c-4ebe-8143-7dded9e0b685-tigera-ca-bundle\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137350 kubelet[1545]: I1213 14:22:36.137319 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-k4frs\" (UniqueName: \"kubernetes.io/projected/87d58046-202c-4ebe-8143-7dded9e0b685-kube-api-access-k4frs\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137478 kubelet[1545]: I1213 14:22:36.137350 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-var-run-calico\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137478 kubelet[1545]: I1213 14:22:36.137433 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/87d58046-202c-4ebe-8143-7dded9e0b685-node-certs\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137478 kubelet[1545]: I1213 14:22:36.137463 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-flexvol-driver-host\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137635 kubelet[1545]: I1213 14:22:36.137491 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-lib-modules\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137635 kubelet[1545]: I1213 14:22:36.137524 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-log-dir\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137635 kubelet[1545]: I1213 14:22:36.137551 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-xtables-lock\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137635 kubelet[1545]: I1213 14:22:36.137588 1545 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-net-dir\") pod \"87d58046-202c-4ebe-8143-7dded9e0b685\" (UID: \"87d58046-202c-4ebe-8143-7dded9e0b685\") " Dec 13 14:22:36.137850 kubelet[1545]: I1213 14:22:36.136625 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.137850 kubelet[1545]: I1213 14:22:36.137078 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-policysync" (OuterVolumeSpecName: "policysync") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.137850 kubelet[1545]: I1213 14:22:36.137679 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.137850 kubelet[1545]: I1213 14:22:36.137766 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.138206 kubelet[1545]: I1213 14:22:36.138145 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.139230 kubelet[1545]: I1213 14:22:36.138756 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.139474 kubelet[1545]: I1213 14:22:36.138821 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.139705 kubelet[1545]: I1213 14:22:36.139655 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.139929 kubelet[1545]: I1213 14:22:36.139889 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.148411 systemd[1]: var-lib-kubelet-pods-87d58046\x2d202c\x2d4ebe\x2d8143\x2d7dded9e0b685-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 14:22:36.148611 systemd[1]: var-lib-kubelet-pods-87d58046\x2d202c\x2d4ebe\x2d8143\x2d7dded9e0b685-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 14:22:36.149549 kubelet[1545]: I1213 14:22:36.149489 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/87d58046-202c-4ebe-8143-7dded9e0b685-node-certs" (OuterVolumeSpecName: "node-certs") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:22:36.154458 kubelet[1545]: I1213 14:22:36.154401 1545 topology_manager.go:215] "Topology Admit Handler" podUID="7586e909-ac3d-456b-9b64-f54a3e6ca738" podNamespace="calico-system" podName="calico-node-x4kqx" Dec 13 14:22:36.154766 kubelet[1545]: E1213 14:22:36.154745 1545 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="87d58046-202c-4ebe-8143-7dded9e0b685" containerName="flexvol-driver" Dec 13 14:22:36.154898 kubelet[1545]: E1213 14:22:36.154872 1545 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="87d58046-202c-4ebe-8143-7dded9e0b685" containerName="install-cni" Dec 13 14:22:36.154999 kubelet[1545]: E1213 14:22:36.154984 1545 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="87d58046-202c-4ebe-8143-7dded9e0b685" containerName="calico-node" Dec 13 14:22:36.155093 kubelet[1545]: E1213 14:22:36.155077 1545 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="87d58046-202c-4ebe-8143-7dded9e0b685" containerName="calico-node" Dec 13 14:22:36.155224 kubelet[1545]: I1213 14:22:36.155206 1545 memory_manager.go:354] "RemoveStaleState removing state" podUID="87d58046-202c-4ebe-8143-7dded9e0b685" containerName="calico-node" Dec 13 14:22:36.155526 kubelet[1545]: I1213 14:22:36.155496 1545 memory_manager.go:354] "RemoveStaleState removing state" podUID="87d58046-202c-4ebe-8143-7dded9e0b685" containerName="calico-node" Dec 13 14:22:36.156327 kubelet[1545]: I1213 14:22:36.156234 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/87d58046-202c-4ebe-8143-7dded9e0b685-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:22:36.166900 kubelet[1545]: I1213 14:22:36.166388 1545 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/87d58046-202c-4ebe-8143-7dded9e0b685-kube-api-access-k4frs" (OuterVolumeSpecName: "kube-api-access-k4frs") pod "87d58046-202c-4ebe-8143-7dded9e0b685" (UID: "87d58046-202c-4ebe-8143-7dded9e0b685"). InnerVolumeSpecName "kube-api-access-k4frs". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:22:36.168428 systemd[1]: var-lib-kubelet-pods-87d58046\x2d202c\x2d4ebe\x2d8143\x2d7dded9e0b685-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dk4frs.mount: Deactivated successfully. Dec 13 14:22:36.172897 systemd[1]: Created slice kubepods-besteffort-pod7586e909_ac3d_456b_9b64_f54a3e6ca738.slice. Dec 13 14:22:36.238925 kubelet[1545]: I1213 14:22:36.238839 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7586e909-ac3d-456b-9b64-f54a3e6ca738-policysync\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.238925 kubelet[1545]: I1213 14:22:36.238919 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7586e909-ac3d-456b-9b64-f54a3e6ca738-node-certs\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239367 kubelet[1545]: I1213 14:22:36.238955 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zb7x4\" (UniqueName: \"kubernetes.io/projected/7586e909-ac3d-456b-9b64-f54a3e6ca738-kube-api-access-zb7x4\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239367 kubelet[1545]: I1213 14:22:36.238988 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7586e909-ac3d-456b-9b64-f54a3e6ca738-var-run-calico\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239367 kubelet[1545]: I1213 14:22:36.239015 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7586e909-ac3d-456b-9b64-f54a3e6ca738-var-lib-calico\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239367 kubelet[1545]: I1213 14:22:36.239042 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7586e909-ac3d-456b-9b64-f54a3e6ca738-cni-bin-dir\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239367 kubelet[1545]: I1213 14:22:36.239071 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7586e909-ac3d-456b-9b64-f54a3e6ca738-cni-log-dir\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239675 kubelet[1545]: I1213 14:22:36.239095 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7586e909-ac3d-456b-9b64-f54a3e6ca738-lib-modules\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239675 kubelet[1545]: I1213 14:22:36.239121 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7586e909-ac3d-456b-9b64-f54a3e6ca738-cni-net-dir\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239675 kubelet[1545]: I1213 14:22:36.239147 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7586e909-ac3d-456b-9b64-f54a3e6ca738-flexvol-driver-host\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239675 kubelet[1545]: I1213 14:22:36.239175 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7586e909-ac3d-456b-9b64-f54a3e6ca738-xtables-lock\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239675 kubelet[1545]: I1213 14:22:36.239201 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7586e909-ac3d-456b-9b64-f54a3e6ca738-tigera-ca-bundle\") pod \"calico-node-x4kqx\" (UID: \"7586e909-ac3d-456b-9b64-f54a3e6ca738\") " pod="calico-system/calico-node-x4kqx" Dec 13 14:22:36.239675 kubelet[1545]: I1213 14:22:36.239403 1545 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-policysync\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.239982 kubelet[1545]: I1213 14:22:36.239432 1545 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-var-lib-calico\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.239982 kubelet[1545]: I1213 14:22:36.239488 1545 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87d58046-202c-4ebe-8143-7dded9e0b685-tigera-ca-bundle\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.239982 kubelet[1545]: I1213 14:22:36.239505 1545 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-bin-dir\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.239982 kubelet[1545]: I1213 14:22:36.239520 1545 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-var-run-calico\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.239982 kubelet[1545]: I1213 14:22:36.239534 1545 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-k4frs\" (UniqueName: \"kubernetes.io/projected/87d58046-202c-4ebe-8143-7dded9e0b685-kube-api-access-k4frs\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.239982 kubelet[1545]: I1213 14:22:36.239550 1545 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/87d58046-202c-4ebe-8143-7dded9e0b685-node-certs\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.239982 kubelet[1545]: I1213 14:22:36.239576 1545 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-log-dir\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.239982 kubelet[1545]: I1213 14:22:36.239590 1545 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-xtables-lock\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.240261 kubelet[1545]: I1213 14:22:36.239607 1545 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-cni-net-dir\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.240261 kubelet[1545]: I1213 14:22:36.239623 1545 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-flexvol-driver-host\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.240261 kubelet[1545]: I1213 14:22:36.239639 1545 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/87d58046-202c-4ebe-8143-7dded9e0b685-lib-modules\") on node \"10.128.0.29\" DevicePath \"\"" Dec 13 14:22:36.465613 kubelet[1545]: E1213 14:22:36.465416 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:36.477799 env[1210]: time="2024-12-13T14:22:36.477701544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x4kqx,Uid:7586e909-ac3d-456b-9b64-f54a3e6ca738,Namespace:calico-system,Attempt:0,}" Dec 13 14:22:36.503015 env[1210]: time="2024-12-13T14:22:36.502864091Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:36.503015 env[1210]: time="2024-12-13T14:22:36.502949249Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:36.503429 env[1210]: time="2024-12-13T14:22:36.502968014Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:36.503429 env[1210]: time="2024-12-13T14:22:36.503369016Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4ef07e38ff094629a66f8f1dcbb926b3c5c5bc96da28189747cd693c8d0d9637 pid=2280 runtime=io.containerd.runc.v2 Dec 13 14:22:36.527788 systemd[1]: Started cri-containerd-4ef07e38ff094629a66f8f1dcbb926b3c5c5bc96da28189747cd693c8d0d9637.scope. Dec 13 14:22:36.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.579320 kernel: audit: type=1400 audit(1734099756.556:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.600290 kernel: audit: type=1400 audit(1734099756.556:572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.621280 kernel: audit: type=1400 audit(1734099756.556:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.663876 kernel: audit: type=1400 audit(1734099756.556:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.664059 kernel: audit: type=1400 audit(1734099756.556:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.685311 kernel: audit: type=1400 audit(1734099756.556:576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.674307 systemd[1]: Removed slice kubepods-besteffort-pod87d58046_202c_4ebe_8143_7dded9e0b685.slice. Dec 13 14:22:36.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.727427 kernel: audit: type=1400 audit(1734099756.556:577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.727551 kernel: audit: type=1400 audit(1734099756.556:578): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit: BPF prog-id=87 op=LOAD Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2280 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465663037653338666630393436323961363666386631646362623932 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2280 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465663037653338666630393436323961363666386631646362623932 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.599000 audit: BPF prog-id=88 op=LOAD Dec 13 14:22:36.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001cea90 items=0 ppid=2280 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465663037653338666630393436323961363666386631646362623932 Dec 13 14:22:36.620000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.620000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.620000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.620000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.620000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.620000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.620000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.620000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.620000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.620000 audit: BPF prog-id=89 op=LOAD Dec 13 14:22:36.620000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001cead8 items=0 ppid=2280 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465663037653338666630393436323961363666386631646362623932 Dec 13 14:22:36.641000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:22:36.641000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.641000 audit: BPF prog-id=90 op=LOAD Dec 13 14:22:36.641000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001ceee8 items=0 ppid=2280 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465663037653338666630393436323961363666386631646362623932 Dec 13 14:22:36.748910 env[1210]: time="2024-12-13T14:22:36.748847102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x4kqx,Uid:7586e909-ac3d-456b-9b64-f54a3e6ca738,Namespace:calico-system,Attempt:0,} returns sandbox id \"4ef07e38ff094629a66f8f1dcbb926b3c5c5bc96da28189747cd693c8d0d9637\"" Dec 13 14:22:36.752829 env[1210]: time="2024-12-13T14:22:36.752767978Z" level=info msg="CreateContainer within sandbox \"4ef07e38ff094629a66f8f1dcbb926b3c5c5bc96da28189747cd693c8d0d9637\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:22:36.780695 env[1210]: time="2024-12-13T14:22:36.780609111Z" level=info msg="CreateContainer within sandbox \"4ef07e38ff094629a66f8f1dcbb926b3c5c5bc96da28189747cd693c8d0d9637\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"54f541cb138a66499a8a60f5260fed6f6383c1427b6d8d79b03743d6fc0aa3a0\"" Dec 13 14:22:36.781809 env[1210]: time="2024-12-13T14:22:36.781761094Z" level=info msg="StartContainer for \"54f541cb138a66499a8a60f5260fed6f6383c1427b6d8d79b03743d6fc0aa3a0\"" Dec 13 14:22:36.806639 systemd[1]: Started cri-containerd-54f541cb138a66499a8a60f5260fed6f6383c1427b6d8d79b03743d6fc0aa3a0.scope. Dec 13 14:22:36.823732 kubelet[1545]: I1213 14:22:36.822530 1545 scope.go:117] "RemoveContainer" containerID="364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e" Dec 13 14:22:36.833867 env[1210]: time="2024-12-13T14:22:36.833814076Z" level=info msg="RemoveContainer for \"364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e\"" Dec 13 14:22:36.837000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.837000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f0b4a440a18 items=0 ppid=2280 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534663534316362313338613636343939613861363066353236306665 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.838000 audit: BPF prog-id=91 op=LOAD Dec 13 14:22:36.838000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001787e8 items=0 ppid=2280 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534663534316362313338613636343939613861363066353236306665 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit: BPF prog-id=92 op=LOAD Dec 13 14:22:36.840000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000178838 items=0 ppid=2280 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534663534316362313338613636343939613861363066353236306665 Dec 13 14:22:36.840000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:22:36.840000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.840000 audit: BPF prog-id=93 op=LOAD Dec 13 14:22:36.840000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001788c8 items=0 ppid=2280 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534663534316362313338613636343939613861363066353236306665 Dec 13 14:22:36.845058 env[1210]: time="2024-12-13T14:22:36.844998793Z" level=info msg="RemoveContainer for \"364d51cf96d3f9976e90daf818083c0d25965ca41bb88b246a850ea2983f868e\" returns successfully" Dec 13 14:22:36.845591 kubelet[1545]: I1213 14:22:36.845428 1545 scope.go:117] "RemoveContainer" containerID="612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8" Dec 13 14:22:36.847026 env[1210]: time="2024-12-13T14:22:36.846984932Z" level=info msg="RemoveContainer for \"612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8\"" Dec 13 14:22:36.852896 env[1210]: time="2024-12-13T14:22:36.852857609Z" level=info msg="RemoveContainer for \"612dc96fbdfc236de03c3f8a715aa00b33405cc9bb1195f4155ea2efa9429bb8\" returns successfully" Dec 13 14:22:36.853448 kubelet[1545]: I1213 14:22:36.853312 1545 scope.go:117] "RemoveContainer" containerID="44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d" Dec 13 14:22:36.854997 env[1210]: time="2024-12-13T14:22:36.854859597Z" level=info msg="RemoveContainer for \"44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d\"" Dec 13 14:22:36.859145 env[1210]: time="2024-12-13T14:22:36.859092382Z" level=info msg="RemoveContainer for \"44a84d2a74ada60ea003bf7b97642091d3edbba59194a72d5d6d4642b7b98a6d\" returns successfully" Dec 13 14:22:36.868794 env[1210]: time="2024-12-13T14:22:36.867892744Z" level=info msg="StartContainer for \"54f541cb138a66499a8a60f5260fed6f6383c1427b6d8d79b03743d6fc0aa3a0\" returns successfully" Dec 13 14:22:36.886290 systemd[1]: cri-containerd-54f541cb138a66499a8a60f5260fed6f6383c1427b6d8d79b03743d6fc0aa3a0.scope: Deactivated successfully. Dec 13 14:22:36.890000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:22:36.935599 env[1210]: time="2024-12-13T14:22:36.935510989Z" level=info msg="shim disconnected" id=54f541cb138a66499a8a60f5260fed6f6383c1427b6d8d79b03743d6fc0aa3a0 Dec 13 14:22:36.935599 env[1210]: time="2024-12-13T14:22:36.935581531Z" level=warning msg="cleaning up after shim disconnected" id=54f541cb138a66499a8a60f5260fed6f6383c1427b6d8d79b03743d6fc0aa3a0 namespace=k8s.io Dec 13 14:22:36.935599 env[1210]: time="2024-12-13T14:22:36.935599094Z" level=info msg="cleaning up dead shim" Dec 13 14:22:36.949783 env[1210]: time="2024-12-13T14:22:36.949705292Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2358 runtime=io.containerd.runc.v2\ntime=\"2024-12-13T14:22:36Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Dec 13 14:22:37.466521 kubelet[1545]: E1213 14:22:37.466456 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:37.657040 env[1210]: time="2024-12-13T14:22:37.656972511Z" level=info msg="StopPodSandbox for \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\"" Dec 13 14:22:37.700229 env[1210]: time="2024-12-13T14:22:37.700116427Z" level=error msg="StopPodSandbox for \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\" failed" error="failed to destroy network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:37.700579 kubelet[1545]: E1213 14:22:37.700514 1545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:22:37.700707 kubelet[1545]: E1213 14:22:37.700609 1545 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f"} Dec 13 14:22:37.700707 kubelet[1545]: E1213 14:22:37.700671 1545 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6fb560e5-e746-43c8-bf28-29c183d9648d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:37.700879 kubelet[1545]: E1213 14:22:37.700714 1545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6fb560e5-e746-43c8-bf28-29c183d9648d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-rgts5" podUID="6fb560e5-e746-43c8-bf28-29c183d9648d" Dec 13 14:22:37.832170 env[1210]: time="2024-12-13T14:22:37.832097694Z" level=info msg="CreateContainer within sandbox \"4ef07e38ff094629a66f8f1dcbb926b3c5c5bc96da28189747cd693c8d0d9637\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:22:37.855592 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3473783231.mount: Deactivated successfully. Dec 13 14:22:37.861688 env[1210]: time="2024-12-13T14:22:37.861607257Z" level=info msg="CreateContainer within sandbox \"4ef07e38ff094629a66f8f1dcbb926b3c5c5bc96da28189747cd693c8d0d9637\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7f68442921c7d141df03a55664eaa828cfc18eccee17270ea08e3e42a4debc2f\"" Dec 13 14:22:37.862882 env[1210]: time="2024-12-13T14:22:37.862838031Z" level=info msg="StartContainer for \"7f68442921c7d141df03a55664eaa828cfc18eccee17270ea08e3e42a4debc2f\"" Dec 13 14:22:37.908516 systemd[1]: Started cri-containerd-7f68442921c7d141df03a55664eaa828cfc18eccee17270ea08e3e42a4debc2f.scope. Dec 13 14:22:37.926416 systemd[1]: run-containerd-runc-k8s.io-7f68442921c7d141df03a55664eaa828cfc18eccee17270ea08e3e42a4debc2f-runc.dZsY6c.mount: Deactivated successfully. Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4b82f0ab98 items=0 ppid=2280 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363834343239323163376431343164663033613535363634656161 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.945000 audit: BPF prog-id=94 op=LOAD Dec 13 14:22:37.945000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001c0558 items=0 ppid=2280 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363834343239323163376431343164663033613535363634656161 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit: BPF prog-id=95 op=LOAD Dec 13 14:22:37.946000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001c05a8 items=0 ppid=2280 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363834343239323163376431343164663033613535363634656161 Dec 13 14:22:37.946000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:22:37.946000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.946000 audit: BPF prog-id=96 op=LOAD Dec 13 14:22:37.946000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001c0638 items=0 ppid=2280 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363834343239323163376431343164663033613535363634656161 Dec 13 14:22:37.977084 env[1210]: time="2024-12-13T14:22:37.977012042Z" level=info msg="StartContainer for \"7f68442921c7d141df03a55664eaa828cfc18eccee17270ea08e3e42a4debc2f\" returns successfully" Dec 13 14:22:38.467716 kubelet[1545]: E1213 14:22:38.467607 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:38.611353 systemd[1]: cri-containerd-7f68442921c7d141df03a55664eaa828cfc18eccee17270ea08e3e42a4debc2f.scope: Deactivated successfully. Dec 13 14:22:38.615000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:22:38.655737 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7f68442921c7d141df03a55664eaa828cfc18eccee17270ea08e3e42a4debc2f-rootfs.mount: Deactivated successfully. Dec 13 14:22:38.670020 kubelet[1545]: I1213 14:22:38.669955 1545 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="87d58046-202c-4ebe-8143-7dded9e0b685" path="/var/lib/kubelet/pods/87d58046-202c-4ebe-8143-7dded9e0b685/volumes" Dec 13 14:22:38.673228 env[1210]: time="2024-12-13T14:22:38.673102401Z" level=info msg="shim disconnected" id=7f68442921c7d141df03a55664eaa828cfc18eccee17270ea08e3e42a4debc2f Dec 13 14:22:38.673228 env[1210]: time="2024-12-13T14:22:38.673208196Z" level=warning msg="cleaning up after shim disconnected" id=7f68442921c7d141df03a55664eaa828cfc18eccee17270ea08e3e42a4debc2f namespace=k8s.io Dec 13 14:22:38.673228 env[1210]: time="2024-12-13T14:22:38.673226375Z" level=info msg="cleaning up dead shim" Dec 13 14:22:38.685708 env[1210]: time="2024-12-13T14:22:38.685638462Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2442 runtime=io.containerd.runc.v2\n" Dec 13 14:22:38.796902 update_engine[1201]: I1213 14:22:38.796793 1201 update_attempter.cc:509] Updating boot flags... Dec 13 14:22:38.861296 env[1210]: time="2024-12-13T14:22:38.858754943Z" level=info msg="CreateContainer within sandbox \"4ef07e38ff094629a66f8f1dcbb926b3c5c5bc96da28189747cd693c8d0d9637\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:22:38.882048 env[1210]: time="2024-12-13T14:22:38.881856020Z" level=info msg="CreateContainer within sandbox \"4ef07e38ff094629a66f8f1dcbb926b3c5c5bc96da28189747cd693c8d0d9637\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3fa7576e20ca808a38c08593365683005e75e3b0afd11b7d0c044710cf321339\"" Dec 13 14:22:38.885184 env[1210]: time="2024-12-13T14:22:38.883004213Z" level=info msg="StartContainer for \"3fa7576e20ca808a38c08593365683005e75e3b0afd11b7d0c044710cf321339\"" Dec 13 14:22:38.970138 systemd[1]: Started cri-containerd-3fa7576e20ca808a38c08593365683005e75e3b0afd11b7d0c044710cf321339.scope. Dec 13 14:22:39.010000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.010000 audit[2479]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3bf0a722c8 items=0 ppid=2280 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366613735373665323063613830386133386330383539333336353638 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.011000 audit: BPF prog-id=97 op=LOAD Dec 13 14:22:39.011000 audit[2479]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000f0d78 items=0 ppid=2280 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366613735373665323063613830386133386330383539333336353638 Dec 13 14:22:39.012000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.012000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.012000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.012000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.012000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.012000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.012000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.012000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.012000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.012000 audit: BPF prog-id=98 op=LOAD Dec 13 14:22:39.012000 audit[2479]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000f0dc8 items=0 ppid=2280 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366613735373665323063613830386133386330383539333336353638 Dec 13 14:22:39.014000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:22:39.014000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.014000 audit: BPF prog-id=99 op=LOAD Dec 13 14:22:39.014000 audit[2479]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000f0e58 items=0 ppid=2280 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366613735373665323063613830386133386330383539333336353638 Dec 13 14:22:39.057299 env[1210]: time="2024-12-13T14:22:39.057117757Z" level=info msg="StartContainer for \"3fa7576e20ca808a38c08593365683005e75e3b0afd11b7d0c044710cf321339\" returns successfully" Dec 13 14:22:39.468452 kubelet[1545]: E1213 14:22:39.468285 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:40.468958 kubelet[1545]: E1213 14:22:40.468884 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:40.621000 audit[2578]: AVC avc: denied { write } for pid=2578 comm="tee" name="fd" dev="proc" ino=20736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.621000 audit[2578]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1c36d9f8 a2=241 a3=1b6 items=1 ppid=2546 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.621000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:22:40.621000 audit: PATH item=0 name="/dev/fd/63" inode=20731 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.621000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.635000 audit[2585]: AVC avc: denied { write } for pid=2585 comm="tee" name="fd" dev="proc" ino=20742 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.635000 audit[2585]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbccb29f7 a2=241 a3=1b6 items=1 ppid=2551 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.635000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:22:40.635000 audit: PATH item=0 name="/dev/fd/63" inode=20092 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.643000 audit[2591]: AVC avc: denied { write } for pid=2591 comm="tee" name="fd" dev="proc" ino=20748 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.643000 audit[2591]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0c43c9f7 a2=241 a3=1b6 items=1 ppid=2542 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.643000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:22:40.643000 audit: PATH item=0 name="/dev/fd/63" inode=20098 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.635000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.650000 audit[2589]: AVC avc: denied { write } for pid=2589 comm="tee" name="fd" dev="proc" ino=20755 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.650000 audit[2589]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd101f09e8 a2=241 a3=1b6 items=1 ppid=2548 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.650000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:22:40.650000 audit: PATH item=0 name="/dev/fd/63" inode=20097 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.650000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.661000 audit[2601]: AVC avc: denied { write } for pid=2601 comm="tee" name="fd" dev="proc" ino=20761 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.661000 audit[2601]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff09e229f9 a2=241 a3=1b6 items=1 ppid=2555 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.661000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:22:40.661000 audit: PATH item=0 name="/dev/fd/63" inode=20752 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.661000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.675000 audit[2604]: AVC avc: denied { write } for pid=2604 comm="tee" name="fd" dev="proc" ino=20109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.677000 audit[2609]: AVC avc: denied { write } for pid=2609 comm="tee" name="fd" dev="proc" ino=20765 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.677000 audit[2609]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd328ca9e7 a2=241 a3=1b6 items=1 ppid=2550 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.677000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:22:40.677000 audit: PATH item=0 name="/dev/fd/63" inode=20758 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.675000 audit[2604]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd72de99f7 a2=241 a3=1b6 items=1 ppid=2543 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.675000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:22:40.675000 audit: PATH item=0 name="/dev/fd/63" inode=20105 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.675000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.843948 kubelet[1545]: I1213 14:22:40.843891 1545 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:22:40.929000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.929000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.929000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.929000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.929000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.929000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.929000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.929000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.929000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.929000 audit: BPF prog-id=100 op=LOAD Dec 13 14:22:40.929000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe70bd9130 a2=98 a3=3 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.929000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:40.930000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:22:40.930000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.930000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.930000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.930000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.930000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.930000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.930000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.930000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.930000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.930000 audit: BPF prog-id=101 op=LOAD Dec 13 14:22:40.930000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe70bd8f10 a2=74 a3=540051 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.930000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:40.931000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:22:40.931000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.931000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.931000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.931000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.931000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.931000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.931000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.931000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.931000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.931000 audit: BPF prog-id=102 op=LOAD Dec 13 14:22:40.931000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe70bd8f40 a2=94 a3=2 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.931000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:40.932000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:22:41.086014 kernel: kauditd_printk_skb: 254 callbacks suppressed Dec 13 14:22:41.086217 kernel: audit: type=1400 audit(1734099761.058:622): avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.058000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.058000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.134141 kernel: audit: type=1400 audit(1734099761.058:622): avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.134307 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:22:41.134363 kernel: audit: type=1400 audit(1734099761.058:622): avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.134405 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:22:41.058000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.162014 kernel: audit: type=1400 audit(1734099761.058:622): avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.162158 kernel: audit: backlog limit exceeded Dec 13 14:22:41.058000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.187285 kernel: audit: type=1400 audit(1734099761.058:622): avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.187465 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:22:41.187512 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:22:41.058000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.058000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.058000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.058000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.058000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.058000 audit: BPF prog-id=103 op=LOAD Dec 13 14:22:41.058000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe70bd8e00 a2=40 a3=1 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.084000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:22:41.084000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.084000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe70bd8ed0 a2=50 a3=7ffe70bd8fb0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.084000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe70bd8e10 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70bd8e40 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70bd8d50 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe70bd8e60 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe70bd8e40 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe70bd8e30 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe70bd8e60 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70bd8e40 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70bd8e60 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.100000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.100000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70bd8e30 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.100000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.101000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.101000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe70bd8ea0 a2=28 a3=0 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.101000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.101000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.101000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe70bd8c50 a2=50 a3=1 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.101000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.101000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.101000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.101000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.101000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.101000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.101000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe70bd8c50 a2=94 a3=5 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.101000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.200000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe70bd8d00 a2=50 a3=1 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe70bd8e20 a2=4 a3=38 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { confidentiality } for pid=2652 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:41.200000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe70bd8e70 a2=94 a3=6 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.200000 audit[2652]: AVC avc: denied { confidentiality } for pid=2652 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:41.200000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe70bd8620 a2=94 a3=83 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.201000 audit[2652]: AVC avc: denied { confidentiality } for pid=2652 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:41.201000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe70bd8620 a2=94 a3=83 items=0 ppid=2544 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit: BPF prog-id=105 op=LOAD Dec 13 14:22:41.213000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe963b8510 a2=98 a3=1999999999999999 items=0 ppid=2544 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.213000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:22:41.213000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit: BPF prog-id=106 op=LOAD Dec 13 14:22:41.213000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe963b83f0 a2=74 a3=ffff items=0 ppid=2544 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.213000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:22:41.213000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.213000 audit: BPF prog-id=107 op=LOAD Dec 13 14:22:41.213000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe963b8430 a2=40 a3=7ffe963b8610 items=0 ppid=2544 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.213000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:22:41.214000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:22:41.328493 systemd-networkd[1021]: vxlan.calico: Link UP Dec 13 14:22:41.328509 systemd-networkd[1021]: vxlan.calico: Gained carrier Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit: BPF prog-id=108 op=LOAD Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd550a42d0 a2=98 a3=ffffffff items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit: BPF prog-id=109 op=LOAD Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd550a40e0 a2=74 a3=540051 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit: BPF prog-id=110 op=LOAD Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd550a4110 a2=94 a3=2 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd550a3fe0 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd550a4010 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd550a3f20 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd550a4030 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd550a4010 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd550a4000 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd550a4030 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd550a4010 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd550a4030 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd550a4000 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd550a4070 a2=28 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.373000 audit: BPF prog-id=111 op=LOAD Dec 13 14:22:41.373000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd550a3ee0 a2=40 a3=0 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.374000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:22:41.374000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.374000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd550a3ed0 a2=50 a3=2800 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.374000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd550a3ed0 a2=50 a3=2800 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.375000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit: BPF prog-id=112 op=LOAD Dec 13 14:22:41.375000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd550a36f0 a2=94 a3=2 items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.375000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.375000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.375000 audit: BPF prog-id=113 op=LOAD Dec 13 14:22:41.375000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd550a37f0 a2=94 a3=2d items=0 ppid=2544 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.375000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit: BPF prog-id=114 op=LOAD Dec 13 14:22:41.380000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd24636ba0 a2=98 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.380000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit: BPF prog-id=115 op=LOAD Dec 13 14:22:41.380000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd24636980 a2=74 a3=540051 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.380000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.380000 audit: BPF prog-id=116 op=LOAD Dec 13 14:22:41.380000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd246369b0 a2=94 a3=2 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.380000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:22:41.469327 kubelet[1545]: E1213 14:22:41.469276 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit: BPF prog-id=117 op=LOAD Dec 13 14:22:41.525000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd24636870 a2=40 a3=1 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.525000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:22:41.525000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.525000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd24636940 a2=50 a3=7ffd24636a20 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd24636880 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd246368b0 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd246367c0 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd246368d0 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd246368b0 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd246368a0 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd246368d0 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd246368b0 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd246368d0 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.537000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.537000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd246368a0 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd24636910 a2=28 a3=0 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd246366c0 a2=50 a3=1 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit: BPF prog-id=118 op=LOAD Dec 13 14:22:41.538000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd246366c0 a2=94 a3=5 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.538000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd24636770 a2=50 a3=1 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd24636890 a2=4 a3=38 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { confidentiality } for pid=2685 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:41.538000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd246368e0 a2=94 a3=6 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.538000 audit[2685]: AVC avc: denied { confidentiality } for pid=2685 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:41.538000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd24636090 a2=94 a3=83 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { confidentiality } for pid=2685 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:41.539000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd24636090 a2=94 a3=83 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd24637ad0 a2=10 a3=f1f00800 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd24637970 a2=10 a3=3 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd24637910 a2=10 a3=3 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.539000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.539000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd24637910 a2=10 a3=7 items=0 ppid=2544 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.548000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:22:41.632000 audit[2710]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:41.632000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc3c0bf0a0 a2=0 a3=7ffc3c0bf08c items=0 ppid=2544 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.632000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:41.652000 audit[2708]: NETFILTER_CFG table=raw:66 family=2 entries=21 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:41.652000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc2f9639b0 a2=0 a3=7ffc2f96399c items=0 ppid=2544 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.652000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:41.654000 audit[2711]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:41.654000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff0e0d84d0 a2=0 a3=7fff0e0d84bc items=0 ppid=2544 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.654000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:41.655000 audit[2709]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:41.655000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcb00f8ba0 a2=0 a3=556a60259000 items=0 ppid=2544 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.655000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:42.469993 kubelet[1545]: E1213 14:22:42.469918 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:43.110567 systemd-networkd[1021]: vxlan.calico: Gained IPv6LL Dec 13 14:22:43.471348 kubelet[1545]: E1213 14:22:43.471159 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:44.063000 audit[2723]: NETFILTER_CFG table=filter:69 family=2 entries=16 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:44.063000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe45982970 a2=0 a3=7ffe4598295c items=0 ppid=1772 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.063000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:44.067000 audit[2723]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:44.067000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe45982970 a2=0 a3=0 items=0 ppid=1772 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:44.083000 audit[2725]: NETFILTER_CFG table=filter:71 family=2 entries=13 op=nft_register_rule pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:44.083000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe1baaf6a0 a2=0 a3=7ffe1baaf68c items=0 ppid=1772 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:44.088000 audit[2725]: NETFILTER_CFG table=nat:72 family=2 entries=35 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:44.088000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe1baaf6a0 a2=0 a3=7ffe1baaf68c items=0 ppid=1772 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:44.471969 kubelet[1545]: E1213 14:22:44.471785 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:45.157000 audit[2731]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:45.157000 audit[2731]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffbddbd190 a2=0 a3=7fffbddbd17c items=0 ppid=1772 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:45.163000 audit[2731]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:45.163000 audit[2731]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffbddbd190 a2=0 a3=7fffbddbd17c items=0 ppid=1772 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:45.473141 kubelet[1545]: E1213 14:22:45.472864 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:45.657851 env[1210]: time="2024-12-13T14:22:45.657732115Z" level=info msg="StopPodSandbox for \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\"" Dec 13 14:22:45.748204 kubelet[1545]: I1213 14:22:45.748106 1545 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-x4kqx" podStartSLOduration=9.74807314 podStartE2EDuration="9.74807314s" podCreationTimestamp="2024-12-13 14:22:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:22:39.85868288 +0000 UTC m=+32.096318362" watchObservedRunningTime="2024-12-13 14:22:45.74807314 +0000 UTC m=+37.985708681" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.748 [INFO][2745] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.748 [INFO][2745] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" iface="eth0" netns="/var/run/netns/cni-283b60e6-eee5-b8e0-5c60-815600f9dda3" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.749 [INFO][2745] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" iface="eth0" netns="/var/run/netns/cni-283b60e6-eee5-b8e0-5c60-815600f9dda3" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.749 [INFO][2745] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" iface="eth0" netns="/var/run/netns/cni-283b60e6-eee5-b8e0-5c60-815600f9dda3" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.749 [INFO][2745] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.749 [INFO][2745] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.781 [INFO][2752] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" HandleID="k8s-pod-network.556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.782 [INFO][2752] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.782 [INFO][2752] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.797 [WARNING][2752] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" HandleID="k8s-pod-network.556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.797 [INFO][2752] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" HandleID="k8s-pod-network.556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.804 [INFO][2752] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:45.806470 env[1210]: 2024-12-13 14:22:45.805 [INFO][2745] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:22:45.808489 env[1210]: time="2024-12-13T14:22:45.808419993Z" level=info msg="TearDown network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\" successfully" Dec 13 14:22:45.808663 env[1210]: time="2024-12-13T14:22:45.808635442Z" level=info msg="StopPodSandbox for \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\" returns successfully" Dec 13 14:22:45.810832 systemd[1]: run-netns-cni\x2d283b60e6\x2deee5\x2db8e0\x2d5c60\x2d815600f9dda3.mount: Deactivated successfully. Dec 13 14:22:45.813532 env[1210]: time="2024-12-13T14:22:45.813230901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m2zlw,Uid:82085e4c-47c1-4e1f-bc1b-b95bae629a26,Namespace:calico-system,Attempt:1,}" Dec 13 14:22:46.022586 systemd-networkd[1021]: cali88c86469290: Link UP Dec 13 14:22:46.029962 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:22:46.030084 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali88c86469290: link becomes ready Dec 13 14:22:46.030842 systemd-networkd[1021]: cali88c86469290: Gained carrier Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.892 [INFO][2758] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.29-k8s-csi--node--driver--m2zlw-eth0 csi-node-driver- calico-system 82085e4c-47c1-4e1f-bc1b-b95bae629a26 1101 0 2024-12-13 14:22:08 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.29 csi-node-driver-m2zlw eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali88c86469290 [] []}} ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Namespace="calico-system" Pod="csi-node-driver-m2zlw" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--m2zlw-" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.892 [INFO][2758] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Namespace="calico-system" Pod="csi-node-driver-m2zlw" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.931 [INFO][2770] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" HandleID="k8s-pod-network.8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.960 [INFO][2770] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" HandleID="k8s-pod-network.8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003194d0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.29", "pod":"csi-node-driver-m2zlw", "timestamp":"2024-12-13 14:22:45.931448232 +0000 UTC"}, Hostname:"10.128.0.29", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.960 [INFO][2770] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.960 [INFO][2770] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.960 [INFO][2770] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.29' Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.963 [INFO][2770] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" host="10.128.0.29" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.974 [INFO][2770] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.29" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.984 [INFO][2770] ipam/ipam.go 489: Trying affinity for 192.168.125.128/26 host="10.128.0.29" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.988 [INFO][2770] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.991 [INFO][2770] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.991 [INFO][2770] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" host="10.128.0.29" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:45.993 [INFO][2770] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797 Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:46.001 [INFO][2770] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" host="10.128.0.29" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:46.009 [INFO][2770] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.129/26] block=192.168.125.128/26 handle="k8s-pod-network.8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" host="10.128.0.29" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:46.009 [INFO][2770] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.129/26] handle="k8s-pod-network.8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" host="10.128.0.29" Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:46.009 [INFO][2770] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:46.067002 env[1210]: 2024-12-13 14:22:46.009 [INFO][2770] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.129/26] IPv6=[] ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" HandleID="k8s-pod-network.8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:46.068428 env[1210]: 2024-12-13 14:22:46.011 [INFO][2758] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Namespace="calico-system" Pod="csi-node-driver-m2zlw" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-csi--node--driver--m2zlw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"82085e4c-47c1-4e1f-bc1b-b95bae629a26", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"", Pod:"csi-node-driver-m2zlw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali88c86469290", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:46.068428 env[1210]: 2024-12-13 14:22:46.011 [INFO][2758] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.129/32] ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Namespace="calico-system" Pod="csi-node-driver-m2zlw" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:46.068428 env[1210]: 2024-12-13 14:22:46.011 [INFO][2758] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali88c86469290 ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Namespace="calico-system" Pod="csi-node-driver-m2zlw" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:46.068428 env[1210]: 2024-12-13 14:22:46.032 [INFO][2758] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Namespace="calico-system" Pod="csi-node-driver-m2zlw" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:46.068428 env[1210]: 2024-12-13 14:22:46.033 [INFO][2758] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Namespace="calico-system" Pod="csi-node-driver-m2zlw" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-csi--node--driver--m2zlw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"82085e4c-47c1-4e1f-bc1b-b95bae629a26", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797", Pod:"csi-node-driver-m2zlw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali88c86469290", MAC:"4e:67:8e:8d:ed:93", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:46.068428 env[1210]: 2024-12-13 14:22:46.064 [INFO][2758] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797" Namespace="calico-system" Pod="csi-node-driver-m2zlw" WorkloadEndpoint="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:22:46.093567 env[1210]: time="2024-12-13T14:22:46.093038828Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:46.093567 env[1210]: time="2024-12-13T14:22:46.093236138Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:46.093567 env[1210]: time="2024-12-13T14:22:46.093368794Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:46.093908 env[1210]: time="2024-12-13T14:22:46.093672165Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797 pid=2795 runtime=io.containerd.runc.v2 Dec 13 14:22:46.101000 audit[2801]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:46.108614 kernel: kauditd_printk_skb: 459 callbacks suppressed Dec 13 14:22:46.108770 kernel: audit: type=1325 audit(1734099766.101:717): table=filter:75 family=2 entries=10 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:46.101000 audit[2801]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff7fa7eb20 a2=0 a3=7fff7fa7eb0c items=0 ppid=1772 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.135012 systemd[1]: Started cri-containerd-8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797.scope. Dec 13 14:22:46.169395 kernel: audit: type=1300 audit(1734099766.101:717): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff7fa7eb20 a2=0 a3=7fff7fa7eb0c items=0 ppid=1772 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:46.128000 audit[2801]: NETFILTER_CFG table=nat:76 family=2 entries=44 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:46.187310 kernel: audit: type=1327 audit(1734099766.101:717): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:46.187372 kernel: audit: type=1325 audit(1734099766.128:718): table=nat:76 family=2 entries=44 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:46.128000 audit[2801]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff7fa7eb20 a2=0 a3=7fff7fa7eb0c items=0 ppid=1772 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.237288 kernel: audit: type=1300 audit(1734099766.128:718): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff7fa7eb20 a2=0 a3=7fff7fa7eb0c items=0 ppid=1772 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:46.176000 audit[2818]: NETFILTER_CFG table=filter:77 family=2 entries=34 op=nft_register_chain pid=2818 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:46.270082 kernel: audit: type=1327 audit(1734099766.128:718): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:46.270251 kernel: audit: type=1325 audit(1734099766.176:719): table=filter:77 family=2 entries=34 op=nft_register_chain pid=2818 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:46.176000 audit[2818]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd164cce90 a2=0 a3=7ffd164cce7c items=0 ppid=2544 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.307923 kernel: audit: type=1300 audit(1734099766.176:719): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd164cce90 a2=0 a3=7ffd164cce7c items=0 ppid=2544 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.176000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:46.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.338537 env[1210]: time="2024-12-13T14:22:46.334546580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m2zlw,Uid:82085e4c-47c1-4e1f-bc1b-b95bae629a26,Namespace:calico-system,Attempt:1,} returns sandbox id \"8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797\"" Dec 13 14:22:46.338537 env[1210]: time="2024-12-13T14:22:46.338149434Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:22:46.348964 kernel: audit: type=1327 audit(1734099766.176:719): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:46.349122 kernel: audit: type=1400 audit(1734099766.188:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.202000 audit: BPF prog-id=119 op=LOAD Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2795 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386632306363373337643133623736323461636261646339396536 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2795 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386632306363373337643133623736323461636261646339396536 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.203000 audit: BPF prog-id=120 op=LOAD Dec 13 14:22:46.203000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002c5cd0 items=0 ppid=2795 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386632306363373337643133623736323461636261646339396536 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit: BPF prog-id=121 op=LOAD Dec 13 14:22:46.235000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000200d48 items=0 ppid=2795 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386632306363373337643133623736323461636261646339396536 Dec 13 14:22:46.235000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:22:46.235000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:46.235000 audit: BPF prog-id=122 op=LOAD Dec 13 14:22:46.235000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000201158 items=0 ppid=2795 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386632306363373337643133623736323461636261646339396536 Dec 13 14:22:46.473722 kubelet[1545]: E1213 14:22:46.473655 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:47.145000 audit[2840]: NETFILTER_CFG table=filter:78 family=2 entries=10 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:47.145000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe2b3c46a0 a2=0 a3=7ffe2b3c468c items=0 ppid=1772 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:47.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:47.156000 audit[2840]: NETFILTER_CFG table=nat:79 family=2 entries=56 op=nft_register_chain pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:47.156000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe2b3c46a0 a2=0 a3=7ffe2b3c468c items=0 ppid=1772 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:47.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:47.474003 kubelet[1545]: E1213 14:22:47.473831 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:47.718997 systemd-networkd[1021]: cali88c86469290: Gained IPv6LL Dec 13 14:22:48.169000 audit[2843]: NETFILTER_CFG table=filter:80 family=2 entries=9 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:48.169000 audit[2843]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffddd4d2b90 a2=0 a3=7ffddd4d2b7c items=0 ppid=1772 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:48.175000 audit[2843]: NETFILTER_CFG table=nat:81 family=2 entries=27 op=nft_register_chain pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:48.175000 audit[2843]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffddd4d2b90 a2=0 a3=7ffddd4d2b7c items=0 ppid=1772 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:48.222983 env[1210]: time="2024-12-13T14:22:48.222907923Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:48.225774 env[1210]: time="2024-12-13T14:22:48.225721977Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:48.228313 env[1210]: time="2024-12-13T14:22:48.228227995Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:48.230726 env[1210]: time="2024-12-13T14:22:48.230676904Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:48.231512 env[1210]: time="2024-12-13T14:22:48.231465687Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:22:48.236334 env[1210]: time="2024-12-13T14:22:48.236202480Z" level=info msg="CreateContainer within sandbox \"8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:22:48.257415 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2003952388.mount: Deactivated successfully. Dec 13 14:22:48.263260 env[1210]: time="2024-12-13T14:22:48.263176586Z" level=info msg="CreateContainer within sandbox \"8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e22dca4af84917a2f2219e78626a58643e563c781b946853a5ea07ad92d87302\"" Dec 13 14:22:48.264151 env[1210]: time="2024-12-13T14:22:48.264111101Z" level=info msg="StartContainer for \"e22dca4af84917a2f2219e78626a58643e563c781b946853a5ea07ad92d87302\"" Dec 13 14:22:48.297982 systemd[1]: Started cri-containerd-e22dca4af84917a2f2219e78626a58643e563c781b946853a5ea07ad92d87302.scope. Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f97c45ecb08 items=0 ppid=2795 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326463613461663834393137613266323231396537383632366135 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit: BPF prog-id=123 op=LOAD Dec 13 14:22:48.327000 audit[2853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003a0bc8 items=0 ppid=2795 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326463613461663834393137613266323231396537383632366135 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.327000 audit: BPF prog-id=124 op=LOAD Dec 13 14:22:48.327000 audit[2853]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003a0c18 items=0 ppid=2795 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326463613461663834393137613266323231396537383632366135 Dec 13 14:22:48.328000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:22:48.330000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.330000 audit: BPF prog-id=125 op=LOAD Dec 13 14:22:48.330000 audit[2853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003a0ca8 items=0 ppid=2795 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326463613461663834393137613266323231396537383632366135 Dec 13 14:22:48.352729 env[1210]: time="2024-12-13T14:22:48.352634585Z" level=info msg="StartContainer for \"e22dca4af84917a2f2219e78626a58643e563c781b946853a5ea07ad92d87302\" returns successfully" Dec 13 14:22:48.358190 env[1210]: time="2024-12-13T14:22:48.356222099Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:22:48.445485 kubelet[1545]: E1213 14:22:48.445319 1545 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:48.474155 kubelet[1545]: E1213 14:22:48.474074 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:49.475027 kubelet[1545]: E1213 14:22:49.474912 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:49.779487 env[1210]: time="2024-12-13T14:22:49.779420227Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.782471 env[1210]: time="2024-12-13T14:22:49.782418158Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.784838 env[1210]: time="2024-12-13T14:22:49.784785277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.787728 env[1210]: time="2024-12-13T14:22:49.787672025Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.788591 env[1210]: time="2024-12-13T14:22:49.788532425Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:22:49.792467 env[1210]: time="2024-12-13T14:22:49.792414903Z" level=info msg="CreateContainer within sandbox \"8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:22:49.815415 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount824750015.mount: Deactivated successfully. Dec 13 14:22:49.824968 env[1210]: time="2024-12-13T14:22:49.824888758Z" level=info msg="CreateContainer within sandbox \"8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4efc826ab87c3ec171c9ab734b529e4be14b25087aaf5757c92505aa8c70ace4\"" Dec 13 14:22:49.826113 env[1210]: time="2024-12-13T14:22:49.826071410Z" level=info msg="StartContainer for \"4efc826ab87c3ec171c9ab734b529e4be14b25087aaf5757c92505aa8c70ace4\"" Dec 13 14:22:49.868863 systemd[1]: run-containerd-runc-k8s.io-4efc826ab87c3ec171c9ab734b529e4be14b25087aaf5757c92505aa8c70ace4-runc.GehHqd.mount: Deactivated successfully. Dec 13 14:22:49.875372 systemd[1]: Started cri-containerd-4efc826ab87c3ec171c9ab734b529e4be14b25087aaf5757c92505aa8c70ace4.scope. Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4b05ff63e8 items=0 ppid=2795 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666338323661623837633365633137316339616237333462353239 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit: BPF prog-id=126 op=LOAD Dec 13 14:22:49.903000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000291348 items=0 ppid=2795 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666338323661623837633365633137316339616237333462353239 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit: BPF prog-id=127 op=LOAD Dec 13 14:22:49.903000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000291398 items=0 ppid=2795 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666338323661623837633365633137316339616237333462353239 Dec 13 14:22:49.903000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:22:49.903000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.903000 audit: BPF prog-id=128 op=LOAD Dec 13 14:22:49.903000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000291428 items=0 ppid=2795 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666338323661623837633365633137316339616237333462353239 Dec 13 14:22:49.931380 env[1210]: time="2024-12-13T14:22:49.931313699Z" level=info msg="StartContainer for \"4efc826ab87c3ec171c9ab734b529e4be14b25087aaf5757c92505aa8c70ace4\" returns successfully" Dec 13 14:22:50.089000 audit[2919]: NETFILTER_CFG table=filter:82 family=2 entries=8 op=nft_register_rule pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:50.089000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde07028e0 a2=0 a3=7ffde07028cc items=0 ppid=1772 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:50.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:50.094000 audit[2919]: NETFILTER_CFG table=nat:83 family=2 entries=30 op=nft_register_rule pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:50.094000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffde07028e0 a2=0 a3=7ffde07028cc items=0 ppid=1772 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:50.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:50.475321 kubelet[1545]: E1213 14:22:50.475123 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:50.632617 kubelet[1545]: I1213 14:22:50.632408 1545 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:22:50.632617 kubelet[1545]: I1213 14:22:50.632471 1545 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:22:50.635000 audit[2921]: NETFILTER_CFG table=filter:84 family=2 entries=8 op=nft_register_rule pid=2921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:50.635000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcb9bf5b70 a2=0 a3=7ffcb9bf5b5c items=0 ppid=1772 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:50.635000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:50.641000 audit[2921]: NETFILTER_CFG table=nat:85 family=2 entries=34 op=nft_register_chain pid=2921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:50.641000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcb9bf5b70 a2=0 a3=7ffcb9bf5b5c items=0 ppid=1772 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:50.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:50.901437 kubelet[1545]: I1213 14:22:50.901355 1545 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-m2zlw" podStartSLOduration=39.448531008 podStartE2EDuration="42.901323117s" podCreationTimestamp="2024-12-13 14:22:08 +0000 UTC" firstStartedPulling="2024-12-13 14:22:46.337028023 +0000 UTC m=+38.574663483" lastFinishedPulling="2024-12-13 14:22:49.789820114 +0000 UTC m=+42.027455592" observedRunningTime="2024-12-13 14:22:50.900993693 +0000 UTC m=+43.138629180" watchObservedRunningTime="2024-12-13 14:22:50.901323117 +0000 UTC m=+43.138958604" Dec 13 14:22:51.476346 kubelet[1545]: E1213 14:22:51.476281 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:52.476888 kubelet[1545]: E1213 14:22:52.476803 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:52.657772 env[1210]: time="2024-12-13T14:22:52.657716026Z" level=info msg="StopPodSandbox for \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\"" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.720 [INFO][2944] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.721 [INFO][2944] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" iface="eth0" netns="/var/run/netns/cni-88080597-2152-b4e4-0ff5-2a80a7879a02" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.721 [INFO][2944] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" iface="eth0" netns="/var/run/netns/cni-88080597-2152-b4e4-0ff5-2a80a7879a02" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.723 [INFO][2944] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" iface="eth0" netns="/var/run/netns/cni-88080597-2152-b4e4-0ff5-2a80a7879a02" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.723 [INFO][2944] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.723 [INFO][2944] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.754 [INFO][2950] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" HandleID="k8s-pod-network.67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.754 [INFO][2950] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.754 [INFO][2950] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.762 [WARNING][2950] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" HandleID="k8s-pod-network.67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.762 [INFO][2950] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" HandleID="k8s-pod-network.67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.765 [INFO][2950] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:52.768269 env[1210]: 2024-12-13 14:22:52.766 [INFO][2944] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:22:52.771696 systemd[1]: run-netns-cni\x2d88080597\x2d2152\x2db4e4\x2d0ff5\x2d2a80a7879a02.mount: Deactivated successfully. Dec 13 14:22:52.773530 env[1210]: time="2024-12-13T14:22:52.773387419Z" level=info msg="TearDown network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\" successfully" Dec 13 14:22:52.773655 env[1210]: time="2024-12-13T14:22:52.773606120Z" level=info msg="StopPodSandbox for \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\" returns successfully" Dec 13 14:22:52.774757 env[1210]: time="2024-12-13T14:22:52.774715897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-rgts5,Uid:6fb560e5-e746-43c8-bf28-29c183d9648d,Namespace:default,Attempt:1,}" Dec 13 14:22:52.972774 systemd-networkd[1021]: caliac170a591de: Link UP Dec 13 14:22:52.981589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:22:52.981730 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliac170a591de: link becomes ready Dec 13 14:22:52.988576 systemd-networkd[1021]: caliac170a591de: Gained carrier Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.857 [INFO][2956] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0 nginx-deployment-85f456d6dd- default 6fb560e5-e746-43c8-bf28-29c183d9648d 1183 0 2024-12-13 14:22:21 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.29 nginx-deployment-85f456d6dd-rgts5 eth0 default [] [] [kns.default ksa.default.default] caliac170a591de [] []}} ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Namespace="default" Pod="nginx-deployment-85f456d6dd-rgts5" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.857 [INFO][2956] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Namespace="default" Pod="nginx-deployment-85f456d6dd-rgts5" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.906 [INFO][2968] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" HandleID="k8s-pod-network.400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.929 [INFO][2968] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" HandleID="k8s-pod-network.400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000319640), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.29", "pod":"nginx-deployment-85f456d6dd-rgts5", "timestamp":"2024-12-13 14:22:52.90665883 +0000 UTC"}, Hostname:"10.128.0.29", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.929 [INFO][2968] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.929 [INFO][2968] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.929 [INFO][2968] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.29' Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.931 [INFO][2968] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" host="10.128.0.29" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.937 [INFO][2968] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.29" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.944 [INFO][2968] ipam/ipam.go 489: Trying affinity for 192.168.125.128/26 host="10.128.0.29" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.946 [INFO][2968] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.949 [INFO][2968] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.949 [INFO][2968] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" host="10.128.0.29" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.952 [INFO][2968] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9 Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.959 [INFO][2968] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" host="10.128.0.29" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.966 [INFO][2968] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.130/26] block=192.168.125.128/26 handle="k8s-pod-network.400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" host="10.128.0.29" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.966 [INFO][2968] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.130/26] handle="k8s-pod-network.400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" host="10.128.0.29" Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.966 [INFO][2968] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:53.011533 env[1210]: 2024-12-13 14:22:52.966 [INFO][2968] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.130/26] IPv6=[] ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" HandleID="k8s-pod-network.400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:53.012730 env[1210]: 2024-12-13 14:22:52.968 [INFO][2956] cni-plugin/k8s.go 386: Populated endpoint ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Namespace="default" Pod="nginx-deployment-85f456d6dd-rgts5" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"6fb560e5-e746-43c8-bf28-29c183d9648d", ResourceVersion:"1183", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-rgts5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliac170a591de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:53.012730 env[1210]: 2024-12-13 14:22:52.969 [INFO][2956] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.130/32] ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Namespace="default" Pod="nginx-deployment-85f456d6dd-rgts5" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:53.012730 env[1210]: 2024-12-13 14:22:52.969 [INFO][2956] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliac170a591de ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Namespace="default" Pod="nginx-deployment-85f456d6dd-rgts5" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:53.012730 env[1210]: 2024-12-13 14:22:52.989 [INFO][2956] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Namespace="default" Pod="nginx-deployment-85f456d6dd-rgts5" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:53.012730 env[1210]: 2024-12-13 14:22:52.989 [INFO][2956] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Namespace="default" Pod="nginx-deployment-85f456d6dd-rgts5" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"6fb560e5-e746-43c8-bf28-29c183d9648d", ResourceVersion:"1183", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9", Pod:"nginx-deployment-85f456d6dd-rgts5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliac170a591de", MAC:"72:9d:8d:26:a7:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:53.012730 env[1210]: 2024-12-13 14:22:52.998 [INFO][2956] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9" Namespace="default" Pod="nginx-deployment-85f456d6dd-rgts5" WorkloadEndpoint="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:22:53.030343 kernel: kauditd_printk_skb: 166 callbacks suppressed Dec 13 14:22:53.030503 kernel: audit: type=1325 audit(1734099773.023:758): table=filter:86 family=2 entries=38 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:53.023000 audit[2986]: NETFILTER_CFG table=filter:86 family=2 entries=38 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:53.051300 kernel: audit: type=1300 audit(1734099773.023:758): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcc975b6b0 a2=0 a3=7ffcc975b69c items=0 ppid=2544 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:53.023000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcc975b6b0 a2=0 a3=7ffcc975b69c items=0 ppid=2544 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:53.065407 env[1210]: time="2024-12-13T14:22:53.064489273Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:53.065407 env[1210]: time="2024-12-13T14:22:53.064539938Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:53.065407 env[1210]: time="2024-12-13T14:22:53.064559702Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:53.065407 env[1210]: time="2024-12-13T14:22:53.064736238Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9 pid=3000 runtime=io.containerd.runc.v2 Dec 13 14:22:53.104293 kernel: audit: type=1327 audit(1734099773.023:758): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:53.023000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:53.108510 systemd[1]: Started cri-containerd-400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9.scope. Dec 13 14:22:53.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.159454 kernel: audit: type=1400 audit(1734099773.137:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.159511 kernel: audit: type=1400 audit(1734099773.137:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.222462 kernel: audit: type=1400 audit(1734099773.137:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.222626 kernel: audit: type=1400 audit(1734099773.137:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.244522 kernel: audit: type=1400 audit(1734099773.137:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.244675 kernel: audit: type=1400 audit(1734099773.137:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.286187 kernel: audit: type=1400 audit(1734099773.137:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.179000 audit: BPF prog-id=129 op=LOAD Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3000 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:53.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306462616164396530363435336164666561353262653033616264 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3000 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:53.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306462616164396530363435336164666561353262653033616264 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.189000 audit: BPF prog-id=130 op=LOAD Dec 13 14:22:53.189000 audit[3010]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c2560 items=0 ppid=3000 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:53.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306462616164396530363435336164666561353262653033616264 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit: BPF prog-id=131 op=LOAD Dec 13 14:22:53.200000 audit[3010]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c25a8 items=0 ppid=3000 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:53.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306462616164396530363435336164666561353262653033616264 Dec 13 14:22:53.200000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:22:53.200000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:53.200000 audit: BPF prog-id=132 op=LOAD Dec 13 14:22:53.200000 audit[3010]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000257c8 items=0 ppid=3000 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:53.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306462616164396530363435336164666561353262653033616264 Dec 13 14:22:53.309227 env[1210]: time="2024-12-13T14:22:53.309154835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-rgts5,Uid:6fb560e5-e746-43c8-bf28-29c183d9648d,Namespace:default,Attempt:1,} returns sandbox id \"400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9\"" Dec 13 14:22:53.311603 env[1210]: time="2024-12-13T14:22:53.311542904Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:22:53.398891 kubelet[1545]: I1213 14:22:53.397193 1545 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:22:53.477925 kubelet[1545]: E1213 14:22:53.477853 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:53.771997 systemd[1]: run-containerd-runc-k8s.io-400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9-runc.IpuGKW.mount: Deactivated successfully. Dec 13 14:22:54.478131 kubelet[1545]: E1213 14:22:54.478056 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:54.951791 systemd-networkd[1021]: caliac170a591de: Gained IPv6LL Dec 13 14:22:55.479087 kubelet[1545]: E1213 14:22:55.478995 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:56.150739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount293551601.mount: Deactivated successfully. Dec 13 14:22:56.480059 kubelet[1545]: E1213 14:22:56.479601 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:57.480621 kubelet[1545]: E1213 14:22:57.480527 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:57.888710 env[1210]: time="2024-12-13T14:22:57.888632941Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:57.891554 env[1210]: time="2024-12-13T14:22:57.891499560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:57.894088 env[1210]: time="2024-12-13T14:22:57.894036231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:57.897010 env[1210]: time="2024-12-13T14:22:57.896964000Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:57.898122 env[1210]: time="2024-12-13T14:22:57.898068342Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:22:57.901497 env[1210]: time="2024-12-13T14:22:57.901438407Z" level=info msg="CreateContainer within sandbox \"400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:22:57.925272 env[1210]: time="2024-12-13T14:22:57.924519086Z" level=info msg="CreateContainer within sandbox \"400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"99d1d740fb01799c71f7e7231783e35327ba1f7d2d5467c0c90873caa1c86a7b\"" Dec 13 14:22:57.926830 env[1210]: time="2024-12-13T14:22:57.926788990Z" level=info msg="StartContainer for \"99d1d740fb01799c71f7e7231783e35327ba1f7d2d5467c0c90873caa1c86a7b\"" Dec 13 14:22:57.968717 systemd[1]: Started cri-containerd-99d1d740fb01799c71f7e7231783e35327ba1f7d2d5467c0c90873caa1c86a7b.scope. Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.985000 audit: BPF prog-id=133 op=LOAD Dec 13 14:22:57.986000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.986000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3000 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:57.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939643164373430666230313739396337316637653732333137383365 Dec 13 14:22:57.986000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.986000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3000 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:57.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939643164373430666230313739396337316637653732333137383365 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.987000 audit: BPF prog-id=134 op=LOAD Dec 13 14:22:57.987000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000250d0 items=0 ppid=3000 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:57.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939643164373430666230313739396337316637653732333137383365 Dec 13 14:22:57.988000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.988000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.988000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.988000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.988000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.988000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.988000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.988000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.988000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.988000 audit: BPF prog-id=135 op=LOAD Dec 13 14:22:57.988000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025118 items=0 ppid=3000 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:57.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939643164373430666230313739396337316637653732333137383365 Dec 13 14:22:57.989000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:22:57.989000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { perfmon } for pid=3088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit[3088]: AVC avc: denied { bpf } for pid=3088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:57.989000 audit: BPF prog-id=136 op=LOAD Dec 13 14:22:57.989000 audit[3088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025528 items=0 ppid=3000 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:57.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939643164373430666230313739396337316637653732333137383365 Dec 13 14:22:58.010993 env[1210]: time="2024-12-13T14:22:58.010936083Z" level=info msg="StartContainer for \"99d1d740fb01799c71f7e7231783e35327ba1f7d2d5467c0c90873caa1c86a7b\" returns successfully" Dec 13 14:22:58.481491 kubelet[1545]: E1213 14:22:58.481440 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:22:58.910255 kubelet[1545]: I1213 14:22:58.910151 1545 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-rgts5" podStartSLOduration=33.321102572 podStartE2EDuration="37.910124616s" podCreationTimestamp="2024-12-13 14:22:21 +0000 UTC" firstStartedPulling="2024-12-13 14:22:53.310698408 +0000 UTC m=+45.548333874" lastFinishedPulling="2024-12-13 14:22:57.899720441 +0000 UTC m=+50.137355918" observedRunningTime="2024-12-13 14:22:58.909964856 +0000 UTC m=+51.147600341" watchObservedRunningTime="2024-12-13 14:22:58.910124616 +0000 UTC m=+51.147760101" Dec 13 14:22:59.481833 kubelet[1545]: E1213 14:22:59.481746 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:00.482856 kubelet[1545]: E1213 14:23:00.482773 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:01.483949 kubelet[1545]: E1213 14:23:01.483877 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:02.484754 kubelet[1545]: E1213 14:23:02.484677 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:03.485484 kubelet[1545]: E1213 14:23:03.485379 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:04.486449 kubelet[1545]: E1213 14:23:04.486378 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:05.487453 kubelet[1545]: E1213 14:23:05.487363 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:05.631000 audit[3146]: NETFILTER_CFG table=filter:87 family=2 entries=20 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.637976 kernel: kauditd_printk_skb: 107 callbacks suppressed Dec 13 14:23:05.638267 kernel: audit: type=1325 audit(1734099785.631:795): table=filter:87 family=2 entries=20 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.631000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffc3305260 a2=0 a3=7fffc330524c items=0 ppid=1772 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.654751 kernel: audit: type=1300 audit(1734099785.631:795): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffc3305260 a2=0 a3=7fffc330524c items=0 ppid=1772 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.703037 kernel: audit: type=1327 audit(1734099785.631:795): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.703427 kubelet[1545]: I1213 14:23:05.688923 1545 topology_manager.go:215] "Topology Admit Handler" podUID="253074e3-c7f4-4c09-9479-f86554dee8d1" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:23:05.691000 audit[3146]: NETFILTER_CFG table=nat:88 family=2 entries=22 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.709114 systemd[1]: Created slice kubepods-besteffort-pod253074e3_c7f4_4c09_9479_f86554dee8d1.slice. Dec 13 14:23:05.691000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc3305260 a2=0 a3=0 items=0 ppid=1772 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.753230 kernel: audit: type=1325 audit(1734099785.691:796): table=nat:88 family=2 entries=22 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.753526 kernel: audit: type=1300 audit(1734099785.691:796): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc3305260 a2=0 a3=0 items=0 ppid=1772 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.753575 kernel: audit: type=1327 audit(1734099785.691:796): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.691000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.770000 audit[3148]: NETFILTER_CFG table=filter:89 family=2 entries=32 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.770000 audit[3148]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd8b1a3b00 a2=0 a3=7ffd8b1a3aec items=0 ppid=1772 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.821150 kernel: audit: type=1325 audit(1734099785.770:797): table=filter:89 family=2 entries=32 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.821429 kernel: audit: type=1300 audit(1734099785.770:797): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd8b1a3b00 a2=0 a3=7ffd8b1a3aec items=0 ppid=1772 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.821492 kernel: audit: type=1327 audit(1734099785.770:797): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.787000 audit[3148]: NETFILTER_CFG table=nat:90 family=2 entries=22 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.852676 kernel: audit: type=1325 audit(1734099785.787:798): table=nat:90 family=2 entries=22 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.787000 audit[3148]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd8b1a3b00 a2=0 a3=0 items=0 ppid=1772 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.888333 kubelet[1545]: I1213 14:23:05.888254 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/253074e3-c7f4-4c09-9479-f86554dee8d1-data\") pod \"nfs-server-provisioner-0\" (UID: \"253074e3-c7f4-4c09-9479-f86554dee8d1\") " pod="default/nfs-server-provisioner-0" Dec 13 14:23:05.888604 kubelet[1545]: I1213 14:23:05.888358 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7hct7\" (UniqueName: \"kubernetes.io/projected/253074e3-c7f4-4c09-9479-f86554dee8d1-kube-api-access-7hct7\") pod \"nfs-server-provisioner-0\" (UID: \"253074e3-c7f4-4c09-9479-f86554dee8d1\") " pod="default/nfs-server-provisioner-0" Dec 13 14:23:06.027589 env[1210]: time="2024-12-13T14:23:06.027395292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:253074e3-c7f4-4c09-9479-f86554dee8d1,Namespace:default,Attempt:0,}" Dec 13 14:23:06.218993 systemd-networkd[1021]: cali60e51b789ff: Link UP Dec 13 14:23:06.235224 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:23:06.239905 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:23:06.238912 systemd-networkd[1021]: cali60e51b789ff: Gained carrier Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.111 [INFO][3150] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.29-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 253074e3-c7f4-4c09-9479-f86554dee8d1 1245 0 2024-12-13 14:23:05 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.29 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.111 [INFO][3150] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.154 [INFO][3162] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" HandleID="k8s-pod-network.dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Workload="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.167 [INFO][3162] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" HandleID="k8s-pod-network.dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Workload="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000311470), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.29", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:23:06.154489745 +0000 UTC"}, Hostname:"10.128.0.29", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.168 [INFO][3162] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.168 [INFO][3162] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.168 [INFO][3162] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.29' Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.170 [INFO][3162] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" host="10.128.0.29" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.176 [INFO][3162] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.29" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.183 [INFO][3162] ipam/ipam.go 489: Trying affinity for 192.168.125.128/26 host="10.128.0.29" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.185 [INFO][3162] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.188 [INFO][3162] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.188 [INFO][3162] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" host="10.128.0.29" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.190 [INFO][3162] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.197 [INFO][3162] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" host="10.128.0.29" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.206 [INFO][3162] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.131/26] block=192.168.125.128/26 handle="k8s-pod-network.dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" host="10.128.0.29" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.206 [INFO][3162] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.131/26] handle="k8s-pod-network.dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" host="10.128.0.29" Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.206 [INFO][3162] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:06.246918 env[1210]: 2024-12-13 14:23:06.206 [INFO][3162] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.131/26] IPv6=[] ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" HandleID="k8s-pod-network.dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Workload="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:23:06.248315 env[1210]: 2024-12-13 14:23:06.209 [INFO][3150] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"253074e3-c7f4-4c09-9479-f86554dee8d1", ResourceVersion:"1245", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:06.248315 env[1210]: 2024-12-13 14:23:06.209 [INFO][3150] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.131/32] ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:23:06.248315 env[1210]: 2024-12-13 14:23:06.209 [INFO][3150] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:23:06.248315 env[1210]: 2024-12-13 14:23:06.219 [INFO][3150] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:23:06.248776 env[1210]: 2024-12-13 14:23:06.219 [INFO][3150] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"253074e3-c7f4-4c09-9479-f86554dee8d1", ResourceVersion:"1245", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"c2:d3:a5:b0:76:fe", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:06.248776 env[1210]: 2024-12-13 14:23:06.236 [INFO][3150] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.29-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:23:06.278000 audit[3182]: NETFILTER_CFG table=filter:91 family=2 entries=38 op=nft_register_chain pid=3182 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:06.278000 audit[3182]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffc093d0740 a2=0 a3=7ffc093d072c items=0 ppid=2544 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.278000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:06.284754 env[1210]: time="2024-12-13T14:23:06.283729932Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:06.284754 env[1210]: time="2024-12-13T14:23:06.283842799Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:06.284754 env[1210]: time="2024-12-13T14:23:06.283885072Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:06.284754 env[1210]: time="2024-12-13T14:23:06.284192511Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d pid=3190 runtime=io.containerd.runc.v2 Dec 13 14:23:06.314986 systemd[1]: Started cri-containerd-dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d.scope. Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.332000 audit: BPF prog-id=137 op=LOAD Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3190 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343565633735383364333961393364303663636364313731643437 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3190 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343565633735383364333961393364303663636364313731643437 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit: BPF prog-id=138 op=LOAD Dec 13 14:23:06.334000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003616d0 items=0 ppid=3190 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343565633735383364333961393364303663636364313731643437 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit: BPF prog-id=139 op=LOAD Dec 13 14:23:06.334000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000361718 items=0 ppid=3190 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343565633735383364333961393364303663636364313731643437 Dec 13 14:23:06.334000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:23:06.334000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.334000 audit: BPF prog-id=140 op=LOAD Dec 13 14:23:06.334000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000361b28 items=0 ppid=3190 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463343565633735383364333961393364303663636364313731643437 Dec 13 14:23:06.375057 env[1210]: time="2024-12-13T14:23:06.374998495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:253074e3-c7f4-4c09-9479-f86554dee8d1,Namespace:default,Attempt:0,} returns sandbox id \"dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d\"" Dec 13 14:23:06.378123 env[1210]: time="2024-12-13T14:23:06.378056569Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:23:06.487613 kubelet[1545]: E1213 14:23:06.487545 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:07.488081 kubelet[1545]: E1213 14:23:07.488022 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:07.879857 systemd-networkd[1021]: cali60e51b789ff: Gained IPv6LL Dec 13 14:23:08.444814 kubelet[1545]: E1213 14:23:08.444762 1545 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:08.488572 kubelet[1545]: E1213 14:23:08.488313 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:08.492860 env[1210]: time="2024-12-13T14:23:08.492803534Z" level=info msg="StopPodSandbox for \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\"" Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.577 [WARNING][3236] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-csi--node--driver--m2zlw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"82085e4c-47c1-4e1f-bc1b-b95bae629a26", ResourceVersion:"1168", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797", Pod:"csi-node-driver-m2zlw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali88c86469290", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.578 [INFO][3236] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.578 [INFO][3236] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" iface="eth0" netns="" Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.578 [INFO][3236] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.578 [INFO][3236] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.635 [INFO][3242] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" HandleID="k8s-pod-network.556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.635 [INFO][3242] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.635 [INFO][3242] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.643 [WARNING][3242] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" HandleID="k8s-pod-network.556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.643 [INFO][3242] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" HandleID="k8s-pod-network.556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.645 [INFO][3242] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:08.648277 env[1210]: 2024-12-13 14:23:08.646 [INFO][3236] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:23:08.648965 env[1210]: time="2024-12-13T14:23:08.648314691Z" level=info msg="TearDown network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\" successfully" Dec 13 14:23:08.648965 env[1210]: time="2024-12-13T14:23:08.648358001Z" level=info msg="StopPodSandbox for \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\" returns successfully" Dec 13 14:23:08.649723 env[1210]: time="2024-12-13T14:23:08.649678316Z" level=info msg="RemovePodSandbox for \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\"" Dec 13 14:23:08.649848 env[1210]: time="2024-12-13T14:23:08.649733104Z" level=info msg="Forcibly stopping sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\"" Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.779 [WARNING][3264] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-csi--node--driver--m2zlw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"82085e4c-47c1-4e1f-bc1b-b95bae629a26", ResourceVersion:"1168", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"8a8f20cc737d13b7624acbadc99e609e34ed89478a59c8975131342cbad3d797", Pod:"csi-node-driver-m2zlw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali88c86469290", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.779 [INFO][3264] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.780 [INFO][3264] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" iface="eth0" netns="" Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.780 [INFO][3264] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.780 [INFO][3264] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.834 [INFO][3270] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" HandleID="k8s-pod-network.556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.835 [INFO][3270] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.835 [INFO][3270] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.846 [WARNING][3270] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" HandleID="k8s-pod-network.556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.846 [INFO][3270] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" HandleID="k8s-pod-network.556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Workload="10.128.0.29-k8s-csi--node--driver--m2zlw-eth0" Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.849 [INFO][3270] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:08.852263 env[1210]: 2024-12-13 14:23:08.850 [INFO][3264] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2" Dec 13 14:23:08.853481 env[1210]: time="2024-12-13T14:23:08.853409991Z" level=info msg="TearDown network for sandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\" successfully" Dec 13 14:23:08.863319 env[1210]: time="2024-12-13T14:23:08.863233930Z" level=info msg="RemovePodSandbox \"556fea8eb5fa05637e434b225a1812383de6c4681d5c9421c0fae25509e942a2\" returns successfully" Dec 13 14:23:08.864353 env[1210]: time="2024-12-13T14:23:08.864312303Z" level=info msg="StopPodSandbox for \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\"" Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:08.966 [WARNING][3290] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"6fb560e5-e746-43c8-bf28-29c183d9648d", ResourceVersion:"1210", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9", Pod:"nginx-deployment-85f456d6dd-rgts5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliac170a591de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:08.966 [INFO][3290] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:08.966 [INFO][3290] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" iface="eth0" netns="" Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:08.966 [INFO][3290] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:08.966 [INFO][3290] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:09.010 [INFO][3296] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" HandleID="k8s-pod-network.67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:09.011 [INFO][3296] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:09.011 [INFO][3296] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:09.022 [WARNING][3296] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" HandleID="k8s-pod-network.67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:09.022 [INFO][3296] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" HandleID="k8s-pod-network.67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:09.024 [INFO][3296] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:09.028326 env[1210]: 2024-12-13 14:23:09.026 [INFO][3290] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:23:09.029416 env[1210]: time="2024-12-13T14:23:09.029359879Z" level=info msg="TearDown network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\" successfully" Dec 13 14:23:09.029595 env[1210]: time="2024-12-13T14:23:09.029559844Z" level=info msg="StopPodSandbox for \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\" returns successfully" Dec 13 14:23:09.030667 env[1210]: time="2024-12-13T14:23:09.030627927Z" level=info msg="RemovePodSandbox for \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\"" Dec 13 14:23:09.030871 env[1210]: time="2024-12-13T14:23:09.030813290Z" level=info msg="Forcibly stopping sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\"" Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.129 [WARNING][3316] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"6fb560e5-e746-43c8-bf28-29c183d9648d", ResourceVersion:"1210", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 22, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"400dbaad9e06453adfea52be03abd2a5be7bcbcb7e0605c9c674b3f81532d1d9", Pod:"nginx-deployment-85f456d6dd-rgts5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliac170a591de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.129 [INFO][3316] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.129 [INFO][3316] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" iface="eth0" netns="" Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.129 [INFO][3316] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.129 [INFO][3316] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.178 [INFO][3322] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" HandleID="k8s-pod-network.67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.179 [INFO][3322] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.179 [INFO][3322] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.186 [WARNING][3322] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" HandleID="k8s-pod-network.67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.187 [INFO][3322] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" HandleID="k8s-pod-network.67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Workload="10.128.0.29-k8s-nginx--deployment--85f456d6dd--rgts5-eth0" Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.189 [INFO][3322] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:09.192492 env[1210]: 2024-12-13 14:23:09.190 [INFO][3316] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f" Dec 13 14:23:09.194790 env[1210]: time="2024-12-13T14:23:09.192450653Z" level=info msg="TearDown network for sandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\" successfully" Dec 13 14:23:09.199503 env[1210]: time="2024-12-13T14:23:09.199441135Z" level=info msg="RemovePodSandbox \"67669043e15d798fbfe9d7c132b12580daa97a7877c5f42f5b6e1ef11024058f\" returns successfully" Dec 13 14:23:09.200178 env[1210]: time="2024-12-13T14:23:09.200133362Z" level=info msg="StopPodSandbox for \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\"" Dec 13 14:23:09.200343 env[1210]: time="2024-12-13T14:23:09.200280848Z" level=info msg="TearDown network for sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" successfully" Dec 13 14:23:09.200343 env[1210]: time="2024-12-13T14:23:09.200335472Z" level=info msg="StopPodSandbox for \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" returns successfully" Dec 13 14:23:09.200843 env[1210]: time="2024-12-13T14:23:09.200802102Z" level=info msg="RemovePodSandbox for \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\"" Dec 13 14:23:09.200958 env[1210]: time="2024-12-13T14:23:09.200866603Z" level=info msg="Forcibly stopping sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\"" Dec 13 14:23:09.201380 env[1210]: time="2024-12-13T14:23:09.201343236Z" level=info msg="TearDown network for sandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" successfully" Dec 13 14:23:09.207024 env[1210]: time="2024-12-13T14:23:09.206685665Z" level=info msg="RemovePodSandbox \"745c71b497d7f6c6e3b422a39e3ef0e102f82e81aa97f43fcb056fd1cbef39dc\" returns successfully" Dec 13 14:23:09.221411 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4024554640.mount: Deactivated successfully. Dec 13 14:23:09.491309 kubelet[1545]: E1213 14:23:09.491190 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:10.491550 kubelet[1545]: E1213 14:23:10.491449 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:11.491785 kubelet[1545]: E1213 14:23:11.491661 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:11.680424 env[1210]: time="2024-12-13T14:23:11.680349810Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:11.683311 env[1210]: time="2024-12-13T14:23:11.683257963Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:11.685825 env[1210]: time="2024-12-13T14:23:11.685775544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:11.688359 env[1210]: time="2024-12-13T14:23:11.688310145Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:11.689336 env[1210]: time="2024-12-13T14:23:11.689266239Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:23:11.693436 env[1210]: time="2024-12-13T14:23:11.693375223Z" level=info msg="CreateContainer within sandbox \"dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:23:11.711620 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount829941285.mount: Deactivated successfully. Dec 13 14:23:11.721050 env[1210]: time="2024-12-13T14:23:11.720988858Z" level=info msg="CreateContainer within sandbox \"dc45ec7583d39a93d06cccd171d47353d9aa8cf95575ccbd48685529c0010b3d\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"14f5dbedc3e9a2f608501f5a4107cddc4422e5b55a7d166381315feb307785d2\"" Dec 13 14:23:11.722014 env[1210]: time="2024-12-13T14:23:11.721951944Z" level=info msg="StartContainer for \"14f5dbedc3e9a2f608501f5a4107cddc4422e5b55a7d166381315feb307785d2\"" Dec 13 14:23:11.758820 systemd[1]: Started cri-containerd-14f5dbedc3e9a2f608501f5a4107cddc4422e5b55a7d166381315feb307785d2.scope. Dec 13 14:23:11.803578 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:23:11.803759 kernel: audit: type=1400 audit(1734099791.776:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.825279 kernel: audit: type=1400 audit(1734099791.776:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.825457 kernel: audit: type=1400 audit(1734099791.776:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.888419 kernel: audit: type=1400 audit(1734099791.776:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.888668 kernel: audit: type=1400 audit(1734099791.776:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.931684 kernel: audit: type=1400 audit(1734099791.776:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.931855 kernel: audit: type=1400 audit(1734099791.776:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.931900 kernel: audit: type=1400 audit(1734099791.776:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.956733 env[1210]: time="2024-12-13T14:23:11.956673869Z" level=info msg="StartContainer for \"14f5dbedc3e9a2f608501f5a4107cddc4422e5b55a7d166381315feb307785d2\" returns successfully" Dec 13 14:23:11.973899 kernel: audit: type=1400 audit(1734099791.776:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.974167 kernel: audit: type=1400 audit(1734099791.802:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.802000 audit: BPF prog-id=141 op=LOAD Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3190 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:11.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663564626564633365396132663630383530316635613431303763 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3190 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:11.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663564626564633365396132663630383530316635613431303763 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.803000 audit: BPF prog-id=142 op=LOAD Dec 13 14:23:11.803000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025010 items=0 ppid=3190 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:11.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663564626564633365396132663630383530316635613431303763 Dec 13 14:23:11.824000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.824000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.824000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.824000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.824000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.824000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.824000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.824000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.824000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.824000 audit: BPF prog-id=143 op=LOAD Dec 13 14:23:11.824000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025058 items=0 ppid=3190 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:11.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663564626564633365396132663630383530316635613431303763 Dec 13 14:23:11.844000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:23:11.844000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:11.844000 audit: BPF prog-id=144 op=LOAD Dec 13 14:23:11.844000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025468 items=0 ppid=3190 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:11.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663564626564633365396132663630383530316635613431303763 Dec 13 14:23:12.021000 audit[3365]: AVC avc: denied { search } for pid=3365 comm="rpcbind" name="crypto" dev="proc" ino=24625 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:23:12.021000 audit[3365]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f7f79f920c0 a2=0 a3=0 items=0 ppid=3348 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 key=(null) Dec 13 14:23:12.021000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:23:12.069000 audit[3370]: AVC avc: denied { search } for pid=3370 comm="dbus-daemon" name="crypto" dev="proc" ino=24625 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:23:12.069000 audit[3370]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f8d30aaf0c0 a2=0 a3=0 items=0 ppid=3348 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 key=(null) Dec 13 14:23:12.069000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:23:12.073000 audit[3371]: AVC avc: denied { watch } for pid=3371 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=20665 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c262,c326 tclass=dir permissive=0 Dec 13 14:23:12.073000 audit[3371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=559f538e9040 a2=2c8 a3=7ffddce7c0bc items=0 ppid=3348 pid=3371 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 key=(null) Dec 13 14:23:12.073000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:23:12.078000 audit[3372]: AVC avc: denied { read } for pid=3372 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23734 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:23:12.078000 audit[3372]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7efd53679320 a1=80000 a2=d a3=7ffdd0ee4400 items=0 ppid=3348 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 key=(null) Dec 13 14:23:12.078000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:23:12.080000 audit[3372]: AVC avc: denied { search } for pid=3372 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24625 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:23:12.080000 audit[3372]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7efd52bcd0c0 a2=0 a3=0 items=0 ppid=3348 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c326 key=(null) Dec 13 14:23:12.080000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:23:12.492518 kubelet[1545]: E1213 14:23:12.492448 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:13.016990 kubelet[1545]: I1213 14:23:13.016913 1545 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.703313747 podStartE2EDuration="8.016877055s" podCreationTimestamp="2024-12-13 14:23:05 +0000 UTC" firstStartedPulling="2024-12-13 14:23:06.377207371 +0000 UTC m=+58.614842849" lastFinishedPulling="2024-12-13 14:23:11.690770681 +0000 UTC m=+63.928406157" observedRunningTime="2024-12-13 14:23:12.999550764 +0000 UTC m=+65.237186250" watchObservedRunningTime="2024-12-13 14:23:13.016877055 +0000 UTC m=+65.254512540" Dec 13 14:23:13.063000 audit[3392]: NETFILTER_CFG table=filter:92 family=2 entries=20 op=nft_register_rule pid=3392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:13.063000 audit[3392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd5811b4b0 a2=0 a3=7ffd5811b49c items=0 ppid=1772 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.063000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:13.068000 audit[3392]: NETFILTER_CFG table=nat:93 family=2 entries=106 op=nft_register_chain pid=3392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:13.068000 audit[3392]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd5811b4b0 a2=0 a3=7ffd5811b49c items=0 ppid=1772 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:13.493162 kubelet[1545]: E1213 14:23:13.493086 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:14.493689 kubelet[1545]: E1213 14:23:14.493537 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:15.493988 kubelet[1545]: E1213 14:23:15.493896 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:16.494854 kubelet[1545]: E1213 14:23:16.494755 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:17.495048 kubelet[1545]: E1213 14:23:17.494966 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:18.495915 kubelet[1545]: E1213 14:23:18.495846 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:19.497055 kubelet[1545]: E1213 14:23:19.496991 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:20.498045 kubelet[1545]: E1213 14:23:20.497970 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:21.499068 kubelet[1545]: E1213 14:23:21.498991 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:22.179311 kubelet[1545]: I1213 14:23:22.179224 1545 topology_manager.go:215] "Topology Admit Handler" podUID="6975118b-4f53-4b3a-bb9d-04e7a8a605d0" podNamespace="default" podName="test-pod-1" Dec 13 14:23:22.189149 systemd[1]: Created slice kubepods-besteffort-pod6975118b_4f53_4b3a_bb9d_04e7a8a605d0.slice. Dec 13 14:23:22.292892 kubelet[1545]: I1213 14:23:22.292763 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-12158571-9c73-49a8-b088-999f7e2b809f\" (UniqueName: \"kubernetes.io/nfs/6975118b-4f53-4b3a-bb9d-04e7a8a605d0-pvc-12158571-9c73-49a8-b088-999f7e2b809f\") pod \"test-pod-1\" (UID: \"6975118b-4f53-4b3a-bb9d-04e7a8a605d0\") " pod="default/test-pod-1" Dec 13 14:23:22.293338 kubelet[1545]: I1213 14:23:22.293300 1545 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-84gf4\" (UniqueName: \"kubernetes.io/projected/6975118b-4f53-4b3a-bb9d-04e7a8a605d0-kube-api-access-84gf4\") pod \"test-pod-1\" (UID: \"6975118b-4f53-4b3a-bb9d-04e7a8a605d0\") " pod="default/test-pod-1" Dec 13 14:23:22.439001 kernel: Failed to create system directory netfs Dec 13 14:23:22.439442 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:23:22.439500 kernel: audit: type=1400 audit(1734099802.425:843): avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.439560 kernel: Failed to create system directory netfs Dec 13 14:23:22.439597 kernel: Failed to create system directory netfs Dec 13 14:23:22.425000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.467793 kernel: audit: type=1400 audit(1734099802.425:843): avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.468081 kernel: Failed to create system directory netfs Dec 13 14:23:22.425000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.525307 kernel: audit: type=1400 audit(1734099802.425:843): avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.425000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.525702 kubelet[1545]: E1213 14:23:22.525649 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:22.425000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.555562 kernel: audit: type=1400 audit(1734099802.425:843): avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.555777 kernel: audit: type=1300 audit(1734099802.425:843): arch=c000003e syscall=175 success=yes exit=0 a0=55bb24be85e0 a1=153bc a2=55baf96a82b0 a3=5 items=0 ppid=56 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:22.425000 audit[3411]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bb24be85e0 a1=153bc a2=55baf96a82b0 a3=5 items=0 ppid=56 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:22.589293 kernel: Failed to create system directory fscache Dec 13 14:23:22.589675 kernel: audit: type=1327 audit(1734099802.425:843): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:23:22.425000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:23:22.606037 kernel: Failed to create system directory fscache Dec 13 14:23:22.606470 kernel: audit: type=1400 audit(1734099802.560:844): avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.635327 kernel: Failed to create system directory fscache Dec 13 14:23:22.635583 kernel: audit: type=1400 audit(1734099802.560:844): avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.664108 kernel: Failed to create system directory fscache Dec 13 14:23:22.664337 kernel: audit: type=1400 audit(1734099802.560:844): avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.692386 kernel: Failed to create system directory fscache Dec 13 14:23:22.692584 kernel: audit: type=1400 audit(1734099802.560:844): avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.716286 kernel: Failed to create system directory fscache Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.725910 kernel: Failed to create system directory fscache Dec 13 14:23:22.726040 kernel: Failed to create system directory fscache Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.736429 kernel: Failed to create system directory fscache Dec 13 14:23:22.736600 kernel: Failed to create system directory fscache Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.747156 kernel: Failed to create system directory fscache Dec 13 14:23:22.747314 kernel: Failed to create system directory fscache Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.757638 kernel: Failed to create system directory fscache Dec 13 14:23:22.757797 kernel: Failed to create system directory fscache Dec 13 14:23:22.560000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.560000 audit[3411]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bb24dfd9c0 a1=4c0fc a2=55baf96a82b0 a3=5 items=0 ppid=56 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:22.768302 kernel: FS-Cache: Loaded Dec 13 14:23:22.560000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.818386 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.818644 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.818689 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.828672 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.828795 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.839205 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.839402 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.849981 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.850149 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.860256 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.860383 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.870508 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.870790 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.881302 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.881489 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.891567 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.891740 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.901807 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.901903 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.906939 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.912170 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.927715 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.927859 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.927898 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.938228 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.938386 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.951678 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.951853 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.959030 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.959150 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.969452 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.969614 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.980683 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.980883 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.991074 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.991226 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.001581 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.001751 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.011932 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.012119 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.016961 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.022175 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.032854 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.033034 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.043505 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.043720 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.048786 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.059183 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.059428 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.069402 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.075400 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.075544 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.085563 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.085677 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.091279 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.100953 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.101051 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.111335 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.111503 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.121655 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.121824 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.132033 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.132167 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.143042 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.143206 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.153911 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.154059 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.164179 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.164343 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.174845 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.175060 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.185472 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.185650 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.195953 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.196111 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.206321 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.206506 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.216641 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.216821 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.226963 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.227116 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.237574 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.237717 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.247975 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.248146 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.258515 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.258652 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.268952 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.269070 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.280150 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.280303 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.285289 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.295676 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.295803 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.306030 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.306160 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.311581 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.317009 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.327817 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.327968 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.338252 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.338425 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.348603 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.348745 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.359008 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.359169 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.369431 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.369619 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.374629 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.379915 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.385112 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.390188 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.395401 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.401326 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.411227 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.431230 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.431389 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.431425 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.431463 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.440763 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.440873 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.447362 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.451638 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.450598 systemd[1]: run-containerd-runc-k8s.io-3fa7576e20ca808a38c08593365683005e75e3b0afd11b7d0c044710cf321339-runc.5D58OS.mount: Deactivated successfully. Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.459892 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.460064 kernel: Failed to create system directory sunrpc Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:22.794000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.475423 kernel: Failed to create system directory sunrpc Dec 13 14:23:23.499784 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:23:23.499964 kernel: RPC: Registered udp transport module. Dec 13 14:23:23.500013 kernel: RPC: Registered tcp transport module. Dec 13 14:23:23.512468 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:23:22.794000 audit[3411]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bb24e49ad0 a1=1a7f1c a2=55baf96a82b0 a3=5 items=6 ppid=56 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:22.794000 audit: CWD cwd="/" Dec 13 14:23:22.794000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:22.794000 audit: PATH item=1 name=(null) inode=23944 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:22.794000 audit: PATH item=2 name=(null) inode=23944 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:22.794000 audit: PATH item=3 name=(null) inode=23945 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:22.794000 audit: PATH item=4 name=(null) inode=23944 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:22.794000 audit: PATH item=5 name=(null) inode=23946 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:22.794000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:23:23.526552 kubelet[1545]: E1213 14:23:23.526503 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.591510 kernel: Failed to create system directory nfs Dec 13 14:23:23.591667 kernel: Failed to create system directory nfs Dec 13 14:23:23.591705 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.596598 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.601701 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.606554 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.611449 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.616359 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.621219 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.626390 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.631164 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.635994 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.640881 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.645814 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.650754 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.655590 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.660470 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.670203 kernel: Failed to create system directory nfs Dec 13 14:23:23.670371 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.680174 kernel: Failed to create system directory nfs Dec 13 14:23:23.680312 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.689897 kernel: Failed to create system directory nfs Dec 13 14:23:23.690044 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.699576 kernel: Failed to create system directory nfs Dec 13 14:23:23.699727 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.709399 kernel: Failed to create system directory nfs Dec 13 14:23:23.709515 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.719125 kernel: Failed to create system directory nfs Dec 13 14:23:23.719281 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.728844 kernel: Failed to create system directory nfs Dec 13 14:23:23.728954 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.738588 kernel: Failed to create system directory nfs Dec 13 14:23:23.738705 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.748530 kernel: Failed to create system directory nfs Dec 13 14:23:23.748659 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.758356 kernel: Failed to create system directory nfs Dec 13 14:23:23.758488 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.763375 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.768302 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.778060 kernel: Failed to create system directory nfs Dec 13 14:23:23.778204 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.787898 kernel: Failed to create system directory nfs Dec 13 14:23:23.788014 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.797680 kernel: Failed to create system directory nfs Dec 13 14:23:23.797789 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.808267 kernel: Failed to create system directory nfs Dec 13 14:23:23.808399 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.817091 kernel: Failed to create system directory nfs Dec 13 14:23:23.817293 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.826801 kernel: Failed to create system directory nfs Dec 13 14:23:23.826935 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.836570 kernel: Failed to create system directory nfs Dec 13 14:23:23.836692 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.846606 kernel: Failed to create system directory nfs Dec 13 14:23:23.846792 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.856148 kernel: Failed to create system directory nfs Dec 13 14:23:23.856308 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.865851 kernel: Failed to create system directory nfs Dec 13 14:23:23.865961 kernel: Failed to create system directory nfs Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.571000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.875883 kernel: Failed to create system directory nfs Dec 13 14:23:23.905608 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:23:23.571000 audit[3411]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bb2506a700 a1=16e97c a2=55baf96a82b0 a3=5 items=0 ppid=56 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:23.571000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.966459 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.966607 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.966659 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.976307 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.976481 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.986213 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.986352 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.996109 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.996293 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.005999 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.011292 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.012342 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.021417 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.021528 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.031502 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.031668 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.041415 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.041527 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.051405 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.051514 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.056368 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.061285 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.071189 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.071289 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.081208 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.081335 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.091110 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.091358 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.101228 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.101330 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.106060 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.111130 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.116281 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.121392 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.131024 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.131120 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.140995 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.141113 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.145850 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.150890 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.156094 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.166152 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.166293 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.176419 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.176590 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.187089 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.187296 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.197261 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.197431 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.207432 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.207536 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.217360 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.217494 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.227188 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.227336 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.237123 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.237286 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.246988 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.247101 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.256953 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.257090 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.266877 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.267019 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.276947 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.277084 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.287092 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.287222 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.296933 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.297200 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.306831 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.307009 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.316799 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.317017 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.326768 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.326898 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.336828 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.336935 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.346751 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.346904 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.356913 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.357077 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.366756 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.366840 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.376669 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.376786 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.386544 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.386622 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.391537 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.401427 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.401536 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.406402 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.416295 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.416427 kernel: Failed to create system directory nfs4 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:23.941000 audit[3435]: AVC avc: denied { confidentiality } for pid=3435 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.426161 kernel: Failed to create system directory nfs4 Dec 13 14:23:24.526829 kubelet[1545]: E1213 14:23:24.526732 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:24.603635 kernel: NFS: Registering the id_resolver key type Dec 13 14:23:24.603853 kernel: Key type id_resolver registered Dec 13 14:23:24.603899 kernel: Key type id_legacy registered Dec 13 14:23:23.941000 audit[3435]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5dd062d010 a1=208de4 a2=55a3404352b0 a3=5 items=0 ppid=56 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:23.941000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.635030 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.635163 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.635204 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.645281 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.645399 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.664263 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.664424 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.664462 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.670743 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.670850 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.676014 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.686234 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.686368 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.696480 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.696591 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.706720 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.706836 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.717061 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.717220 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.727264 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.727437 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.737495 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.737668 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.747800 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.747870 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.620000 audit[3436]: AVC avc: denied { confidentiality } for pid=3436 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:24.757965 kernel: Failed to create system directory rpcgss Dec 13 14:23:24.620000 audit[3436]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f8dc1118010 a1=70af4 a2=5639332da2b0 a3=5 items=0 ppid=56 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:24.620000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:23:24.790878 nfsidmap[3443]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 14:23:24.805788 nfsidmap[3444]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 14:23:24.821000 audit[1338]: AVC avc: denied { watch_reads } for pid=1338 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2767 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:23:24.821000 audit[1338]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558a95797370 a2=10 a3=e3ce75696f34b3e8 items=0 ppid=1 pid=1338 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:24.821000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:23:24.821000 audit[1338]: AVC avc: denied { watch_reads } for pid=1338 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2767 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:23:24.821000 audit[1338]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558a95797370 a2=10 a3=e3ce75696f34b3e8 items=0 ppid=1 pid=1338 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:24.821000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:23:24.821000 audit[1338]: AVC avc: denied { watch_reads } for pid=1338 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2767 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:23:24.821000 audit[1338]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558a95797370 a2=10 a3=e3ce75696f34b3e8 items=0 ppid=1 pid=1338 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:24.821000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:23:24.823000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2767 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:23:24.823000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2767 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:23:24.823000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2767 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:23:24.896707 env[1210]: time="2024-12-13T14:23:24.896576659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6975118b-4f53-4b3a-bb9d-04e7a8a605d0,Namespace:default,Attempt:0,}" Dec 13 14:23:25.081535 systemd-networkd[1021]: cali5ec59c6bf6e: Link UP Dec 13 14:23:25.098628 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:23:25.098766 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:23:25.101614 systemd-networkd[1021]: cali5ec59c6bf6e: Gained carrier Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:24.993 [INFO][3447] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.29-k8s-test--pod--1-eth0 default 6975118b-4f53-4b3a-bb9d-04e7a8a605d0 1320 0 2024-12-13 14:23:06 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.29 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:24.994 [INFO][3447] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.031 [INFO][3458] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" HandleID="k8s-pod-network.c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Workload="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.042 [INFO][3458] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" HandleID="k8s-pod-network.c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Workload="10.128.0.29-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ef480), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.29", "pod":"test-pod-1", "timestamp":"2024-12-13 14:23:25.031612067 +0000 UTC"}, Hostname:"10.128.0.29", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.042 [INFO][3458] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.042 [INFO][3458] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.042 [INFO][3458] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.29' Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.044 [INFO][3458] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" host="10.128.0.29" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.050 [INFO][3458] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.29" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.055 [INFO][3458] ipam/ipam.go 489: Trying affinity for 192.168.125.128/26 host="10.128.0.29" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.057 [INFO][3458] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.060 [INFO][3458] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="10.128.0.29" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.060 [INFO][3458] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" host="10.128.0.29" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.062 [INFO][3458] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66 Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.066 [INFO][3458] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" host="10.128.0.29" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.074 [INFO][3458] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.132/26] block=192.168.125.128/26 handle="k8s-pod-network.c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" host="10.128.0.29" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.074 [INFO][3458] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.132/26] handle="k8s-pod-network.c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" host="10.128.0.29" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.074 [INFO][3458] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.074 [INFO][3458] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.132/26] IPv6=[] ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" HandleID="k8s-pod-network.c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Workload="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 14:23:25.112843 env[1210]: 2024-12-13 14:23:25.076 [INFO][3447] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6975118b-4f53-4b3a-bb9d-04e7a8a605d0", ResourceVersion:"1320", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:25.114258 env[1210]: 2024-12-13 14:23:25.077 [INFO][3447] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.132/32] ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 14:23:25.114258 env[1210]: 2024-12-13 14:23:25.077 [INFO][3447] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 14:23:25.114258 env[1210]: 2024-12-13 14:23:25.099 [INFO][3447] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 14:23:25.114258 env[1210]: 2024-12-13 14:23:25.100 [INFO][3447] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.29-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6975118b-4f53-4b3a-bb9d-04e7a8a605d0", ResourceVersion:"1320", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.29", ContainerID:"c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"e6:fa:17:51:bc:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:25.114258 env[1210]: 2024-12-13 14:23:25.109 [INFO][3447] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.29-k8s-test--pod--1-eth0" Dec 13 14:23:25.130000 audit[3477]: NETFILTER_CFG table=filter:94 family=2 entries=38 op=nft_register_chain pid=3477 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:25.130000 audit[3477]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffcef630820 a2=0 a3=7ffcef63080c items=0 ppid=2544 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.130000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:25.141446 env[1210]: time="2024-12-13T14:23:25.141320596Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:25.141446 env[1210]: time="2024-12-13T14:23:25.141393203Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:25.141770 env[1210]: time="2024-12-13T14:23:25.141411938Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:25.141770 env[1210]: time="2024-12-13T14:23:25.141705782Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66 pid=3485 runtime=io.containerd.runc.v2 Dec 13 14:23:25.176174 systemd[1]: Started cri-containerd-c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66.scope. Dec 13 14:23:25.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit: BPF prog-id=145 op=LOAD Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3485 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643035663766623235313438633630393936623435653939653865 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3485 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643035663766623235313438633630393936623435653939653865 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit: BPF prog-id=146 op=LOAD Dec 13 14:23:25.196000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304b60 items=0 ppid=3485 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643035663766623235313438633630393936623435653939653865 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.196000 audit: BPF prog-id=147 op=LOAD Dec 13 14:23:25.196000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304ba8 items=0 ppid=3485 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643035663766623235313438633630393936623435653939653865 Dec 13 14:23:25.197000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:23:25.197000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.197000 audit: BPF prog-id=148 op=LOAD Dec 13 14:23:25.197000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000304fb8 items=0 ppid=3485 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643035663766623235313438633630393936623435653939653865 Dec 13 14:23:25.235839 env[1210]: time="2024-12-13T14:23:25.235785685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6975118b-4f53-4b3a-bb9d-04e7a8a605d0,Namespace:default,Attempt:0,} returns sandbox id \"c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66\"" Dec 13 14:23:25.238551 env[1210]: time="2024-12-13T14:23:25.238495169Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:23:25.458317 env[1210]: time="2024-12-13T14:23:25.456718720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.463486 env[1210]: time="2024-12-13T14:23:25.463426419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.466394 env[1210]: time="2024-12-13T14:23:25.466339940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.469613 env[1210]: time="2024-12-13T14:23:25.469551944Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.471085 env[1210]: time="2024-12-13T14:23:25.471008727Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:23:25.475155 env[1210]: time="2024-12-13T14:23:25.475084404Z" level=info msg="CreateContainer within sandbox \"c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:23:25.500938 env[1210]: time="2024-12-13T14:23:25.500851322Z" level=info msg="CreateContainer within sandbox \"c1d05f7fb25148c60996b45e99e8ed4f8e9e9342ab9d73d94d832d14245ccc66\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0276b726541ee56d57ba7c6ed2201c7b41bdfc9e89b0adef9bff2006dccb443d\"" Dec 13 14:23:25.502072 env[1210]: time="2024-12-13T14:23:25.502009671Z" level=info msg="StartContainer for \"0276b726541ee56d57ba7c6ed2201c7b41bdfc9e89b0adef9bff2006dccb443d\"" Dec 13 14:23:25.527543 systemd[1]: Started cri-containerd-0276b726541ee56d57ba7c6ed2201c7b41bdfc9e89b0adef9bff2006dccb443d.scope. Dec 13 14:23:25.530171 kubelet[1545]: E1213 14:23:25.529707 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.548000 audit: BPF prog-id=149 op=LOAD Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3485 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373662373236353431656535366435376261376336656432323031 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3485 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373662373236353431656535366435376261376336656432323031 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit: BPF prog-id=150 op=LOAD Dec 13 14:23:25.549000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001e5770 items=0 ppid=3485 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373662373236353431656535366435376261376336656432323031 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit: BPF prog-id=151 op=LOAD Dec 13 14:23:25.549000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001e57b8 items=0 ppid=3485 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373662373236353431656535366435376261376336656432323031 Dec 13 14:23:25.549000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:23:25.549000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:25.549000 audit: BPF prog-id=152 op=LOAD Dec 13 14:23:25.549000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001e5bc8 items=0 ppid=3485 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:25.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373662373236353431656535366435376261376336656432323031 Dec 13 14:23:25.570791 env[1210]: time="2024-12-13T14:23:25.570724043Z" level=info msg="StartContainer for \"0276b726541ee56d57ba7c6ed2201c7b41bdfc9e89b0adef9bff2006dccb443d\" returns successfully" Dec 13 14:23:25.997636 kubelet[1545]: I1213 14:23:25.997544 1545 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.762610892 podStartE2EDuration="19.99751574s" podCreationTimestamp="2024-12-13 14:23:06 +0000 UTC" firstStartedPulling="2024-12-13 14:23:25.237826084 +0000 UTC m=+77.475461562" lastFinishedPulling="2024-12-13 14:23:25.472730942 +0000 UTC m=+77.710366410" observedRunningTime="2024-12-13 14:23:25.997036069 +0000 UTC m=+78.234671556" watchObservedRunningTime="2024-12-13 14:23:25.99751574 +0000 UTC m=+78.235151225" Dec 13 14:23:26.530521 kubelet[1545]: E1213 14:23:26.530449 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:26.823524 systemd-networkd[1021]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:23:27.531642 kubelet[1545]: E1213 14:23:27.531553 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:28.445417 kubelet[1545]: E1213 14:23:28.445342 1545 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:28.532478 kubelet[1545]: E1213 14:23:28.532404 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:29.533535 kubelet[1545]: E1213 14:23:29.533460 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:30.534400 kubelet[1545]: E1213 14:23:30.534343 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:31.535102 kubelet[1545]: E1213 14:23:31.535018 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:32.535801 kubelet[1545]: E1213 14:23:32.535731 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:23:33.536395 kubelet[1545]: E1213 14:23:33.536332 1545 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"