Dec 13 14:09:00.988966 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Dec 13 14:09:00.988984 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:09:00.988992 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Dec 13 14:09:00.988998 kernel: printk: bootconsole [pl11] enabled Dec 13 14:09:00.989003 kernel: efi: EFI v2.70 by EDK II Dec 13 14:09:00.989009 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3ead8b98 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 Dec 13 14:09:00.989015 kernel: random: crng init done Dec 13 14:09:00.989021 kernel: ACPI: Early table checksum verification disabled Dec 13 14:09:00.989026 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Dec 13 14:09:00.989032 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:09:00.989037 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:09:00.989043 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Dec 13 14:09:00.989049 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:09:00.989054 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:09:00.989061 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:09:00.989067 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:09:00.989072 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:09:00.989079 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:09:00.989085 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Dec 13 14:09:00.989090 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:09:00.989096 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Dec 13 14:09:00.989102 kernel: NUMA: Failed to initialise from firmware Dec 13 14:09:00.989107 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:09:00.989113 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Dec 13 14:09:00.989119 kernel: Zone ranges: Dec 13 14:09:00.989124 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Dec 13 14:09:00.989130 kernel: DMA32 empty Dec 13 14:09:00.989136 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:09:00.989142 kernel: Movable zone start for each node Dec 13 14:09:00.989148 kernel: Early memory node ranges Dec 13 14:09:00.989153 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Dec 13 14:09:00.989159 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Dec 13 14:09:00.989165 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Dec 13 14:09:00.989170 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Dec 13 14:09:00.989176 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Dec 13 14:09:00.989181 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Dec 13 14:09:00.989187 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:09:00.989193 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:09:00.989198 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Dec 13 14:09:00.989205 kernel: psci: probing for conduit method from ACPI. Dec 13 14:09:00.989214 kernel: psci: PSCIv1.1 detected in firmware. Dec 13 14:09:00.989220 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:09:00.989226 kernel: psci: MIGRATE_INFO_TYPE not supported. Dec 13 14:09:00.989231 kernel: psci: SMC Calling Convention v1.4 Dec 13 14:09:00.989237 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Dec 13 14:09:00.989245 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Dec 13 14:09:00.989251 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:09:00.989257 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:09:00.989263 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:09:00.998327 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:09:00.998340 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:09:00.998346 kernel: CPU features: detected: Hardware dirty bit management Dec 13 14:09:00.998353 kernel: CPU features: detected: Spectre-BHB Dec 13 14:09:00.998359 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:09:00.998365 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:09:00.998372 kernel: CPU features: detected: ARM erratum 1418040 Dec 13 14:09:00.998384 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Dec 13 14:09:00.998390 kernel: CPU features: detected: SSBS not fully self-synchronizing Dec 13 14:09:00.998396 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Dec 13 14:09:00.998403 kernel: Policy zone: Normal Dec 13 14:09:00.998411 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:09:00.998418 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:09:00.998424 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:09:00.998430 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:09:00.998437 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:09:00.998443 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Dec 13 14:09:00.998449 kernel: Memory: 3986944K/4194160K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 207216K reserved, 0K cma-reserved) Dec 13 14:09:00.998457 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:09:00.998463 kernel: trace event string verifier disabled Dec 13 14:09:00.998470 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:09:00.998477 kernel: rcu: RCU event tracing is enabled. Dec 13 14:09:00.998483 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:09:00.998489 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:09:00.998495 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:09:00.998502 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:09:00.998508 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:09:00.998514 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:09:00.998520 kernel: GICv3: 960 SPIs implemented Dec 13 14:09:00.998527 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:09:00.998533 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:09:00.998540 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:09:00.998546 kernel: GICv3: 16 PPIs implemented Dec 13 14:09:00.998552 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Dec 13 14:09:00.998558 kernel: ITS: No ITS available, not enabling LPIs Dec 13 14:09:00.998564 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:09:00.998571 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Dec 13 14:09:00.998577 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Dec 13 14:09:00.998583 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Dec 13 14:09:00.998589 kernel: Console: colour dummy device 80x25 Dec 13 14:09:00.998597 kernel: printk: console [tty1] enabled Dec 13 14:09:00.998604 kernel: ACPI: Core revision 20210730 Dec 13 14:09:00.998610 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Dec 13 14:09:00.998617 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:09:00.998623 kernel: LSM: Security Framework initializing Dec 13 14:09:00.998629 kernel: SELinux: Initializing. Dec 13 14:09:00.998636 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:09:00.998643 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:09:00.998649 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Dec 13 14:09:00.998657 kernel: Hyper-V: Host Build 10.0.22477.1594-1-0 Dec 13 14:09:00.998663 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:09:00.998670 kernel: Remapping and enabling EFI services. Dec 13 14:09:00.998676 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:09:00.998682 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:09:00.998689 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Dec 13 14:09:00.998695 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:09:00.998702 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Dec 13 14:09:00.998708 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:09:00.998715 kernel: SMP: Total of 2 processors activated. Dec 13 14:09:00.998722 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:09:00.998729 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Dec 13 14:09:00.998735 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Dec 13 14:09:00.998742 kernel: CPU features: detected: CRC32 instructions Dec 13 14:09:00.998748 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Dec 13 14:09:00.998755 kernel: CPU features: detected: LSE atomic instructions Dec 13 14:09:00.998762 kernel: CPU features: detected: Privileged Access Never Dec 13 14:09:00.998768 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:09:00.998774 kernel: alternatives: patching kernel code Dec 13 14:09:00.998782 kernel: devtmpfs: initialized Dec 13 14:09:00.998793 kernel: KASLR enabled Dec 13 14:09:00.998800 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:09:00.998808 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:09:00.998815 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:09:00.998821 kernel: SMBIOS 3.1.0 present. Dec 13 14:09:00.998828 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Dec 13 14:09:00.998835 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:09:00.998842 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:09:00.998850 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:09:00.998857 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:09:00.998863 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:09:00.998870 kernel: audit: type=2000 audit(0.084:1): state=initialized audit_enabled=0 res=1 Dec 13 14:09:00.998877 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:09:00.998883 kernel: cpuidle: using governor menu Dec 13 14:09:00.998890 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:09:00.998898 kernel: ASID allocator initialised with 32768 entries Dec 13 14:09:00.998905 kernel: ACPI: bus type PCI registered Dec 13 14:09:00.998911 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:09:00.998918 kernel: Serial: AMBA PL011 UART driver Dec 13 14:09:00.998925 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:09:00.998931 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:09:00.998938 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:09:00.998945 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:09:00.998951 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:09:00.998959 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:09:00.998966 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:09:00.998972 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:09:00.998979 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:09:00.998985 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:09:00.998993 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:09:00.998999 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:09:00.999006 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:09:00.999013 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:09:00.999020 kernel: ACPI: Interpreter enabled Dec 13 14:09:00.999027 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:09:00.999034 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Dec 13 14:09:00.999041 kernel: printk: console [ttyAMA0] enabled Dec 13 14:09:00.999047 kernel: printk: bootconsole [pl11] disabled Dec 13 14:09:00.999054 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Dec 13 14:09:00.999061 kernel: iommu: Default domain type: Translated Dec 13 14:09:00.999068 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:09:00.999074 kernel: vgaarb: loaded Dec 13 14:09:00.999081 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:09:00.999089 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:09:00.999096 kernel: PTP clock support registered Dec 13 14:09:00.999102 kernel: Registered efivars operations Dec 13 14:09:00.999109 kernel: No ACPI PMU IRQ for CPU0 Dec 13 14:09:00.999115 kernel: No ACPI PMU IRQ for CPU1 Dec 13 14:09:00.999122 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:09:00.999128 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:09:00.999135 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:09:00.999143 kernel: pnp: PnP ACPI init Dec 13 14:09:00.999150 kernel: pnp: PnP ACPI: found 0 devices Dec 13 14:09:00.999156 kernel: NET: Registered PF_INET protocol family Dec 13 14:09:00.999163 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:09:00.999170 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:09:00.999177 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:09:00.999183 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:09:00.999190 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:09:00.999197 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:09:00.999205 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:09:00.999212 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:09:00.999218 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:09:00.999225 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:09:00.999232 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Dec 13 14:09:00.999238 kernel: kvm [1]: HYP mode not available Dec 13 14:09:00.999245 kernel: Initialise system trusted keyrings Dec 13 14:09:00.999252 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:09:00.999258 kernel: Key type asymmetric registered Dec 13 14:09:00.999276 kernel: Asymmetric key parser 'x509' registered Dec 13 14:09:00.999284 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:09:00.999290 kernel: io scheduler mq-deadline registered Dec 13 14:09:00.999297 kernel: io scheduler kyber registered Dec 13 14:09:00.999304 kernel: io scheduler bfq registered Dec 13 14:09:00.999311 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:09:00.999317 kernel: thunder_xcv, ver 1.0 Dec 13 14:09:00.999324 kernel: thunder_bgx, ver 1.0 Dec 13 14:09:00.999331 kernel: nicpf, ver 1.0 Dec 13 14:09:00.999337 kernel: nicvf, ver 1.0 Dec 13 14:09:00.999468 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:09:00.999528 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:09:00 UTC (1734098940) Dec 13 14:09:00.999537 kernel: efifb: probing for efifb Dec 13 14:09:00.999544 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:09:00.999551 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:09:00.999557 kernel: efifb: scrolling: redraw Dec 13 14:09:00.999564 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:09:00.999573 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:09:00.999580 kernel: fb0: EFI VGA frame buffer device Dec 13 14:09:00.999587 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Dec 13 14:09:00.999593 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:09:00.999600 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:09:00.999607 kernel: Segment Routing with IPv6 Dec 13 14:09:00.999613 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:09:00.999620 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:09:00.999626 kernel: Key type dns_resolver registered Dec 13 14:09:00.999633 kernel: registered taskstats version 1 Dec 13 14:09:00.999641 kernel: Loading compiled-in X.509 certificates Dec 13 14:09:00.999648 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:09:00.999654 kernel: Key type .fscrypt registered Dec 13 14:09:00.999661 kernel: Key type fscrypt-provisioning registered Dec 13 14:09:00.999668 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:09:00.999674 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:09:00.999681 kernel: ima: No architecture policies found Dec 13 14:09:00.999688 kernel: clk: Disabling unused clocks Dec 13 14:09:00.999695 kernel: Freeing unused kernel memory: 36416K Dec 13 14:09:00.999702 kernel: Run /init as init process Dec 13 14:09:00.999708 kernel: with arguments: Dec 13 14:09:00.999715 kernel: /init Dec 13 14:09:00.999722 kernel: with environment: Dec 13 14:09:00.999728 kernel: HOME=/ Dec 13 14:09:00.999735 kernel: TERM=linux Dec 13 14:09:00.999741 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:09:00.999750 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:09:00.999760 systemd[1]: Detected virtualization microsoft. Dec 13 14:09:00.999768 systemd[1]: Detected architecture arm64. Dec 13 14:09:00.999775 systemd[1]: Running in initrd. Dec 13 14:09:00.999782 systemd[1]: No hostname configured, using default hostname. Dec 13 14:09:00.999789 systemd[1]: Hostname set to . Dec 13 14:09:00.999796 systemd[1]: Initializing machine ID from random generator. Dec 13 14:09:00.999803 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:09:00.999812 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:09:00.999819 systemd[1]: Reached target cryptsetup.target. Dec 13 14:09:00.999826 systemd[1]: Reached target paths.target. Dec 13 14:09:00.999833 systemd[1]: Reached target slices.target. Dec 13 14:09:00.999840 systemd[1]: Reached target swap.target. Dec 13 14:09:00.999847 systemd[1]: Reached target timers.target. Dec 13 14:09:00.999855 systemd[1]: Listening on iscsid.socket. Dec 13 14:09:00.999862 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:09:00.999870 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:09:00.999878 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:09:00.999885 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:09:00.999892 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:09:00.999899 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:09:00.999907 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:09:00.999914 systemd[1]: Reached target sockets.target. Dec 13 14:09:00.999921 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:09:00.999928 systemd[1]: Finished network-cleanup.service. Dec 13 14:09:00.999936 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:09:00.999944 systemd[1]: Starting systemd-journald.service... Dec 13 14:09:00.999951 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:09:00.999958 systemd[1]: Starting systemd-resolved.service... Dec 13 14:09:00.999965 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:09:00.999976 systemd-journald[276]: Journal started Dec 13 14:09:01.000017 systemd-journald[276]: Runtime Journal (/run/log/journal/1fa59781b5e248bbb9e7c62e34aa8b83) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:09:00.992962 systemd-modules-load[277]: Inserted module 'overlay' Dec 13 14:09:01.035716 systemd[1]: Started systemd-journald.service. Dec 13 14:09:01.035774 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:09:01.027860 systemd-resolved[278]: Positive Trust Anchors: Dec 13 14:09:01.068105 kernel: audit: type=1130 audit(1734098941.040:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.027879 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:09:01.112206 kernel: Bridge firewalling registered Dec 13 14:09:01.112240 kernel: audit: type=1130 audit(1734098941.063:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.112261 kernel: audit: type=1130 audit(1734098941.079:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.027908 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:09:01.172966 kernel: audit: type=1130 audit(1734098941.116:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.172996 kernel: SCSI subsystem initialized Dec 13 14:09:01.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.029981 systemd-resolved[278]: Defaulting to hostname 'linux'. Dec 13 14:09:01.216013 kernel: audit: type=1130 audit(1734098941.180:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.216043 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:09:01.216054 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:09:01.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.040608 systemd[1]: Started systemd-resolved.service. Dec 13 14:09:01.063653 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:09:01.244249 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:09:01.079938 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:09:01.275358 kernel: audit: type=1130 audit(1734098941.249:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.094774 systemd-modules-load[277]: Inserted module 'br_netfilter' Dec 13 14:09:01.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.299308 kernel: audit: type=1130 audit(1734098941.275:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.165292 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:09:01.337364 kernel: audit: type=1130 audit(1734098941.312:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.197240 systemd[1]: Reached target nss-lookup.target. Dec 13 14:09:01.226969 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:09:01.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.363236 dracut-cmdline[300]: dracut-dracut-053 Dec 13 14:09:01.363236 dracut-cmdline[300]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=t Dec 13 14:09:01.363236 dracut-cmdline[300]: tyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:09:01.407606 kernel: audit: type=1130 audit(1734098941.337:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.231558 systemd-modules-load[277]: Inserted module 'dm_multipath' Dec 13 14:09:01.232326 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:09:01.242648 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:09:01.249772 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:09:01.280498 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:09:01.307975 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:09:01.313215 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:09:01.338300 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:09:01.474288 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:09:01.489289 kernel: iscsi: registered transport (tcp) Dec 13 14:09:01.510100 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:09:01.510153 kernel: QLogic iSCSI HBA Driver Dec 13 14:09:01.539388 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:09:01.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:01.544844 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:09:01.597285 kernel: raid6: neonx8 gen() 13829 MB/s Dec 13 14:09:01.618282 kernel: raid6: neonx8 xor() 10840 MB/s Dec 13 14:09:01.638279 kernel: raid6: neonx4 gen() 13574 MB/s Dec 13 14:09:01.660277 kernel: raid6: neonx4 xor() 11307 MB/s Dec 13 14:09:01.680281 kernel: raid6: neonx2 gen() 13023 MB/s Dec 13 14:09:01.700276 kernel: raid6: neonx2 xor() 10420 MB/s Dec 13 14:09:01.722277 kernel: raid6: neonx1 gen() 10492 MB/s Dec 13 14:09:01.742277 kernel: raid6: neonx1 xor() 8791 MB/s Dec 13 14:09:01.762281 kernel: raid6: int64x8 gen() 6273 MB/s Dec 13 14:09:01.784276 kernel: raid6: int64x8 xor() 3544 MB/s Dec 13 14:09:01.820275 kernel: raid6: int64x4 gen() 7243 MB/s Dec 13 14:09:01.831289 kernel: raid6: int64x4 xor() 3859 MB/s Dec 13 14:09:01.845282 kernel: raid6: int64x2 gen() 6152 MB/s Dec 13 14:09:01.865276 kernel: raid6: int64x2 xor() 3324 MB/s Dec 13 14:09:01.885278 kernel: raid6: int64x1 gen() 5052 MB/s Dec 13 14:09:01.910329 kernel: raid6: int64x1 xor() 2646 MB/s Dec 13 14:09:01.910352 kernel: raid6: using algorithm neonx8 gen() 13829 MB/s Dec 13 14:09:01.910368 kernel: raid6: .... xor() 10840 MB/s, rmw enabled Dec 13 14:09:01.914407 kernel: raid6: using neon recovery algorithm Dec 13 14:09:01.934892 kernel: xor: measuring software checksum speed Dec 13 14:09:01.934908 kernel: 8regs : 16929 MB/sec Dec 13 14:09:01.938769 kernel: 32regs : 20702 MB/sec Dec 13 14:09:01.942675 kernel: arm64_neon : 27616 MB/sec Dec 13 14:09:01.942690 kernel: xor: using function: arm64_neon (27616 MB/sec) Dec 13 14:09:02.002285 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:09:02.011235 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:09:02.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:02.019000 audit: BPF prog-id=7 op=LOAD Dec 13 14:09:02.019000 audit: BPF prog-id=8 op=LOAD Dec 13 14:09:02.020151 systemd[1]: Starting systemd-udevd.service... Dec 13 14:09:02.037638 systemd-udevd[476]: Using default interface naming scheme 'v252'. Dec 13 14:09:02.044353 systemd[1]: Started systemd-udevd.service. Dec 13 14:09:02.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:02.054542 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:09:02.064378 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Dec 13 14:09:02.091474 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:09:02.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:02.097091 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:09:02.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:02.133722 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:09:02.191285 kernel: hv_vmbus: Vmbus version:5.3 Dec 13 14:09:02.224681 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:09:02.224726 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:09:02.224736 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:09:02.224744 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Dec 13 14:09:02.224760 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:09:02.224768 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:09:02.247287 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Dec 13 14:09:02.247332 kernel: scsi host1: storvsc_host_t Dec 13 14:09:02.253369 kernel: scsi host0: storvsc_host_t Dec 13 14:09:02.260178 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:09:02.268296 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:09:02.289246 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:09:02.299877 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:09:02.299891 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:09:02.332844 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:09:02.335666 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:09:02.337077 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:09:02.337178 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:09:02.337263 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:09:02.337379 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:09:02.337390 kernel: hv_netvsc 000d3af6-d59d-000d-3af6-d59d000d3af6 eth0: VF slot 1 added Dec 13 14:09:02.337475 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:09:02.352135 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:09:02.352172 kernel: hv_pci f6bd3c5a-cf2a-4957-aa97-6ad86a40a0d7: PCI VMBus probing: Using version 0x10004 Dec 13 14:09:02.453368 kernel: hv_pci f6bd3c5a-cf2a-4957-aa97-6ad86a40a0d7: PCI host bridge to bus cf2a:00 Dec 13 14:09:02.453474 kernel: pci_bus cf2a:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Dec 13 14:09:02.453563 kernel: pci_bus cf2a:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:09:02.453634 kernel: pci cf2a:00:02.0: [15b3:1018] type 00 class 0x020000 Dec 13 14:09:02.453739 kernel: pci cf2a:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:09:02.453822 kernel: pci cf2a:00:02.0: enabling Extended Tags Dec 13 14:09:02.453900 kernel: pci cf2a:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at cf2a:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Dec 13 14:09:02.453979 kernel: pci_bus cf2a:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:09:02.454049 kernel: pci cf2a:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:09:02.491289 kernel: mlx5_core cf2a:00:02.0: firmware version: 16.30.1284 Dec 13 14:09:02.708159 kernel: mlx5_core cf2a:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Dec 13 14:09:02.708286 kernel: hv_netvsc 000d3af6-d59d-000d-3af6-d59d000d3af6 eth0: VF registering: eth1 Dec 13 14:09:02.708375 kernel: mlx5_core cf2a:00:02.0 eth1: joined to eth0 Dec 13 14:09:02.717304 kernel: mlx5_core cf2a:00:02.0 enP53034s1: renamed from eth1 Dec 13 14:09:02.805413 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:09:02.947291 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (540) Dec 13 14:09:02.960458 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:09:03.005577 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:09:03.011407 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:09:03.036513 systemd[1]: Starting disk-uuid.service... Dec 13 14:09:03.173639 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:09:04.062297 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:09:04.062542 disk-uuid[598]: The operation has completed successfully. Dec 13 14:09:04.120346 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:09:04.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.120448 systemd[1]: Finished disk-uuid.service. Dec 13 14:09:04.130216 systemd[1]: Starting verity-setup.service... Dec 13 14:09:04.177141 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:09:04.371215 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:09:04.377199 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:09:04.390087 systemd[1]: Finished verity-setup.service. Dec 13 14:09:04.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.441288 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:09:04.438154 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:09:04.442234 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:09:04.442992 systemd[1]: Starting ignition-setup.service... Dec 13 14:09:04.450585 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:09:04.489080 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:09:04.489126 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:09:04.489141 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:09:04.541347 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:09:04.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.550000 audit: BPF prog-id=9 op=LOAD Dec 13 14:09:04.551516 systemd[1]: Starting systemd-networkd.service... Dec 13 14:09:04.576483 systemd-networkd[843]: lo: Link UP Dec 13 14:09:04.576494 systemd-networkd[843]: lo: Gained carrier Dec 13 14:09:04.576882 systemd-networkd[843]: Enumeration completed Dec 13 14:09:04.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.580817 systemd-networkd[843]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:09:04.581354 systemd[1]: Started systemd-networkd.service. Dec 13 14:09:04.589830 systemd[1]: Reached target network.target. Dec 13 14:09:04.605553 systemd[1]: Starting iscsiuio.service... Dec 13 14:09:04.614251 systemd[1]: Started iscsiuio.service. Dec 13 14:09:04.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.626997 systemd[1]: Starting iscsid.service... Dec 13 14:09:04.638346 iscsid[848]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:09:04.638346 iscsid[848]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:09:04.638346 iscsid[848]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:09:04.638346 iscsid[848]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:09:04.638346 iscsid[848]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:09:04.638346 iscsid[848]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:09:04.638346 iscsid[848]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:09:04.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.638445 systemd[1]: Started iscsid.service. Dec 13 14:09:04.643498 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:09:04.705129 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:09:04.717818 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:09:04.730077 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:09:04.739825 systemd[1]: Reached target remote-fs.target. Dec 13 14:09:04.749796 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:09:04.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.767489 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:09:04.787075 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:09:04.808287 kernel: mlx5_core cf2a:00:02.0 enP53034s1: Link up Dec 13 14:09:04.847857 systemd[1]: Finished ignition-setup.service. Dec 13 14:09:04.867640 kernel: hv_netvsc 000d3af6-d59d-000d-3af6-d59d000d3af6 eth0: Data path switched to VF: enP53034s1 Dec 13 14:09:04.867790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:09:04.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:04.859749 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:09:04.863004 systemd-networkd[843]: enP53034s1: Link UP Dec 13 14:09:04.863098 systemd-networkd[843]: eth0: Link UP Dec 13 14:09:04.863219 systemd-networkd[843]: eth0: Gained carrier Dec 13 14:09:04.876788 systemd-networkd[843]: enP53034s1: Gained carrier Dec 13 14:09:04.891359 systemd-networkd[843]: eth0: DHCPv4 address 10.200.20.31/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:09:06.475454 systemd-networkd[843]: eth0: Gained IPv6LL Dec 13 14:09:07.984683 ignition[870]: Ignition 2.14.0 Dec 13 14:09:07.987867 ignition[870]: Stage: fetch-offline Dec 13 14:09:07.987954 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:09:07.987981 ignition[870]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:09:08.075048 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:09:08.075193 ignition[870]: parsed url from cmdline: "" Dec 13 14:09:08.075197 ignition[870]: no config URL provided Dec 13 14:09:08.075202 ignition[870]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:09:08.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.088818 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:09:08.128933 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:09:08.128957 kernel: audit: type=1130 audit(1734098948.097:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.075209 ignition[870]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:09:08.107735 systemd[1]: Starting ignition-fetch.service... Dec 13 14:09:08.075214 ignition[870]: failed to fetch config: resource requires networking Dec 13 14:09:08.075480 ignition[870]: Ignition finished successfully Dec 13 14:09:08.115138 ignition[876]: Ignition 2.14.0 Dec 13 14:09:08.115144 ignition[876]: Stage: fetch Dec 13 14:09:08.115290 ignition[876]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:09:08.115322 ignition[876]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:09:08.119561 ignition[876]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:09:08.119843 ignition[876]: parsed url from cmdline: "" Dec 13 14:09:08.119848 ignition[876]: no config URL provided Dec 13 14:09:08.119858 ignition[876]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:09:08.119870 ignition[876]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:09:08.119927 ignition[876]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:09:08.220983 ignition[876]: GET result: OK Dec 13 14:09:08.221055 ignition[876]: config has been read from IMDS userdata Dec 13 14:09:08.223593 unknown[876]: fetched base config from "system" Dec 13 14:09:08.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.221072 ignition[876]: parsing config with SHA512: 10c2de3524d2e81014012edcb6ed31f4cf9689f196dbfccdec6d128c6b7d1c99d5afb16ab71bf052fc53804ccd64bb0fe5e7a8ffc2b83b0af1fb00531534a232 Dec 13 14:09:08.223601 unknown[876]: fetched base config from "system" Dec 13 14:09:08.263162 kernel: audit: type=1130 audit(1734098948.233:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.224008 ignition[876]: fetch: fetch complete Dec 13 14:09:08.223606 unknown[876]: fetched user config from "azure" Dec 13 14:09:08.224013 ignition[876]: fetch: fetch passed Dec 13 14:09:08.297086 kernel: audit: type=1130 audit(1734098948.275:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.229387 systemd[1]: Finished ignition-fetch.service. Dec 13 14:09:08.224067 ignition[876]: Ignition finished successfully Dec 13 14:09:08.254502 systemd[1]: Starting ignition-kargs.service... Dec 13 14:09:08.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.265852 ignition[882]: Ignition 2.14.0 Dec 13 14:09:08.270750 systemd[1]: Finished ignition-kargs.service. Dec 13 14:09:08.265858 ignition[882]: Stage: kargs Dec 13 14:09:08.350048 kernel: audit: type=1130 audit(1734098948.309:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.276173 systemd[1]: Starting ignition-disks.service... Dec 13 14:09:08.265955 ignition[882]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:09:08.301664 systemd[1]: Finished ignition-disks.service. Dec 13 14:09:08.265973 ignition[882]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:09:08.331024 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:09:08.268458 ignition[882]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:09:08.338909 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:09:08.269916 ignition[882]: kargs: kargs passed Dec 13 14:09:08.347231 systemd[1]: Reached target local-fs.target. Dec 13 14:09:08.269974 ignition[882]: Ignition finished successfully Dec 13 14:09:08.354360 systemd[1]: Reached target sysinit.target. Dec 13 14:09:08.285229 ignition[888]: Ignition 2.14.0 Dec 13 14:09:08.362435 systemd[1]: Reached target basic.target. Dec 13 14:09:08.285235 ignition[888]: Stage: disks Dec 13 14:09:08.376753 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:09:08.285358 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:09:08.285376 ignition[888]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:09:08.288103 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:09:08.298018 ignition[888]: disks: disks passed Dec 13 14:09:08.298077 ignition[888]: Ignition finished successfully Dec 13 14:09:08.481947 systemd-fsck[896]: ROOT: clean, 621/7326000 files, 481076/7359488 blocks Dec 13 14:09:08.497717 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:09:08.521331 kernel: audit: type=1130 audit(1734098948.502:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:08.520694 systemd[1]: Mounting sysroot.mount... Dec 13 14:09:08.679295 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:09:08.679834 systemd[1]: Mounted sysroot.mount. Dec 13 14:09:08.684011 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:09:09.072840 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:09:09.077413 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:09:09.089532 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:09:09.089577 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:09:09.105191 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:09:09.297619 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:09:09.303000 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:09:09.325352 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (907) Dec 13 14:09:09.338158 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:09:09.338208 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:09:09.338219 initrd-setup-root[912]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:09:09.348690 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:09:09.351913 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:09:09.362208 initrd-setup-root[938]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:09:09.388251 initrd-setup-root[946]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:09:09.397047 initrd-setup-root[954]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:09:09.828287 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:09:09.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:09.833833 systemd[1]: Starting ignition-mount.service... Dec 13 14:09:09.869002 kernel: audit: type=1130 audit(1734098949.832:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:09.858788 systemd[1]: Starting sysroot-boot.service... Dec 13 14:09:09.863738 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:09:09.863842 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:09:09.891066 systemd[1]: Finished sysroot-boot.service. Dec 13 14:09:09.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:09.916360 kernel: audit: type=1130 audit(1734098949.895:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:10.040302 ignition[976]: INFO : Ignition 2.14.0 Dec 13 14:09:10.040302 ignition[976]: INFO : Stage: mount Dec 13 14:09:10.049768 ignition[976]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:09:10.049768 ignition[976]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:09:10.049768 ignition[976]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:09:10.049768 ignition[976]: INFO : mount: mount passed Dec 13 14:09:10.049768 ignition[976]: INFO : Ignition finished successfully Dec 13 14:09:10.106054 kernel: audit: type=1130 audit(1734098950.060:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:10.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:10.056563 systemd[1]: Finished ignition-mount.service. Dec 13 14:09:10.698606 coreos-metadata[906]: Dec 13 14:09:10.698 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:09:10.707550 coreos-metadata[906]: Dec 13 14:09:10.707 INFO Fetch successful Dec 13 14:09:10.734936 coreos-metadata[906]: Dec 13 14:09:10.734 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:09:10.746642 coreos-metadata[906]: Dec 13 14:09:10.746 INFO Fetch successful Dec 13 14:09:10.763325 coreos-metadata[906]: Dec 13 14:09:10.763 INFO wrote hostname ci-3510.3.6-a-9396bf5055 to /sysroot/etc/hostname Dec 13 14:09:10.772377 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:09:10.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:10.778514 systemd[1]: Starting ignition-files.service... Dec 13 14:09:10.805536 kernel: audit: type=1130 audit(1734098950.777:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:10.804859 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:09:10.828766 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (985) Dec 13 14:09:10.828797 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:09:10.828808 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:09:10.838623 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:09:10.842808 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:09:10.856426 ignition[1004]: INFO : Ignition 2.14.0 Dec 13 14:09:10.856426 ignition[1004]: INFO : Stage: files Dec 13 14:09:10.867708 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:09:10.867708 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:09:10.867708 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:09:10.867708 ignition[1004]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:09:10.867708 ignition[1004]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:09:10.867708 ignition[1004]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:09:10.988878 ignition[1004]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:09:10.997069 ignition[1004]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:09:11.005211 ignition[1004]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:09:10.997166 unknown[1004]: wrote ssh authorized keys file for user: core Dec 13 14:09:11.019996 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:09:11.030379 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:09:11.030379 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:09:11.030379 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:09:11.030379 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:09:11.030379 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:09:11.104061 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1007) Dec 13 14:09:11.091984 systemd[1]: mnt-oem949243388.mount: Deactivated successfully. Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem949243388" Dec 13 14:09:11.111194 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem949243388": device or resource busy Dec 13 14:09:11.111194 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem949243388", trying btrfs: device or resource busy Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem949243388" Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem949243388" Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem949243388" Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem949243388" Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:09:11.111194 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4225328091" Dec 13 14:09:11.111194 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4225328091": device or resource busy Dec 13 14:09:11.277706 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4225328091", trying btrfs: device or resource busy Dec 13 14:09:11.277706 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4225328091" Dec 13 14:09:11.277706 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4225328091" Dec 13 14:09:11.277706 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem4225328091" Dec 13 14:09:11.277706 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem4225328091" Dec 13 14:09:11.277706 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:09:11.277706 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:09:11.277706 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Dec 13 14:09:11.113745 systemd[1]: mnt-oem4225328091.mount: Deactivated successfully. Dec 13 14:09:11.632260 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 14:09:11.881997 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:09:11.894159 ignition[1004]: INFO : files: op(f): [started] processing unit "waagent.service" Dec 13 14:09:11.894159 ignition[1004]: INFO : files: op(f): [finished] processing unit "waagent.service" Dec 13 14:09:11.894159 ignition[1004]: INFO : files: op(10): [started] processing unit "nvidia.service" Dec 13 14:09:11.894159 ignition[1004]: INFO : files: op(10): [finished] processing unit "nvidia.service" Dec 13 14:09:11.894159 ignition[1004]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Dec 13 14:09:11.894159 ignition[1004]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Dec 13 14:09:11.894159 ignition[1004]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Dec 13 14:09:11.894159 ignition[1004]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:09:12.003562 kernel: audit: type=1130 audit(1734098951.905:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:11.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:11.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:11.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:11.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:11.897565 systemd[1]: Finished ignition-files.service. Dec 13 14:09:12.007966 ignition[1004]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:09:12.007966 ignition[1004]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:09:12.007966 ignition[1004]: INFO : files: files passed Dec 13 14:09:12.007966 ignition[1004]: INFO : Ignition finished successfully Dec 13 14:09:12.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:11.928174 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:09:11.933675 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:09:12.075736 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:09:11.940751 systemd[1]: Starting ignition-quench.service... Dec 13 14:09:11.954018 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:09:11.954149 systemd[1]: Finished ignition-quench.service. Dec 13 14:09:12.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:11.966310 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:09:11.979186 systemd[1]: Reached target ignition-complete.target. Dec 13 14:09:11.992060 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:09:12.013524 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:09:12.013653 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:09:12.022973 systemd[1]: Reached target initrd-fs.target. Dec 13 14:09:12.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.037626 systemd[1]: Reached target initrd.target. Dec 13 14:09:12.045884 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:09:12.046800 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:09:12.097178 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:09:12.102673 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:09:12.122101 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:09:12.129969 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:09:12.139471 systemd[1]: Stopped target timers.target. Dec 13 14:09:12.149075 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:09:12.149184 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:09:12.158005 systemd[1]: Stopped target initrd.target. Dec 13 14:09:12.166172 systemd[1]: Stopped target basic.target. Dec 13 14:09:12.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.174556 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:09:12.186675 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:09:12.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.196223 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:09:12.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.206542 systemd[1]: Stopped target remote-fs.target. Dec 13 14:09:12.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.215577 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:09:12.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.224456 systemd[1]: Stopped target sysinit.target. Dec 13 14:09:12.233921 systemd[1]: Stopped target local-fs.target. Dec 13 14:09:12.242188 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:09:12.349415 iscsid[848]: iscsid shutting down. Dec 13 14:09:12.357964 ignition[1042]: INFO : Ignition 2.14.0 Dec 13 14:09:12.357964 ignition[1042]: INFO : Stage: umount Dec 13 14:09:12.357964 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:09:12.357964 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:09:12.357964 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:09:12.357964 ignition[1042]: INFO : umount: umount passed Dec 13 14:09:12.357964 ignition[1042]: INFO : Ignition finished successfully Dec 13 14:09:12.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.252709 systemd[1]: Stopped target swap.target. Dec 13 14:09:12.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.260891 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:09:12.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.261027 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:09:12.269675 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:09:12.278016 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:09:12.278112 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:09:12.287588 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:09:12.287687 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:09:12.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.297608 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:09:12.297693 systemd[1]: Stopped ignition-files.service. Dec 13 14:09:12.307180 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:09:12.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.307297 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:09:12.317447 systemd[1]: Stopping ignition-mount.service... Dec 13 14:09:12.332931 systemd[1]: Stopping iscsid.service... Dec 13 14:09:12.337167 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:09:12.354585 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:09:12.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.354747 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:09:12.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.362542 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:09:12.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.362647 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:09:12.602000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:09:12.372633 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:09:12.372756 systemd[1]: Stopped iscsid.service. Dec 13 14:09:12.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.379405 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:09:12.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.379493 systemd[1]: Stopped ignition-mount.service. Dec 13 14:09:12.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.394751 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:09:12.395190 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:09:12.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.395306 systemd[1]: Stopped ignition-disks.service. Dec 13 14:09:12.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.420729 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:09:12.420834 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:09:12.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.430467 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:09:12.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.430552 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:09:12.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.440296 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:09:12.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.440392 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:09:12.755742 kernel: hv_netvsc 000d3af6-d59d-000d-3af6-d59d000d3af6 eth0: Data path switched from VF: enP53034s1 Dec 13 14:09:12.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.448729 systemd[1]: Stopped target paths.target. Dec 13 14:09:12.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.457914 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:09:12.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.461306 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:09:12.466696 systemd[1]: Stopped target slices.target. Dec 13 14:09:12.475159 systemd[1]: Stopped target sockets.target. Dec 13 14:09:12.484435 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:09:12.484526 systemd[1]: Closed iscsid.socket. Dec 13 14:09:12.492348 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:09:12.492434 systemd[1]: Stopped ignition-setup.service. Dec 13 14:09:12.502731 systemd[1]: Stopping iscsiuio.service... Dec 13 14:09:12.517019 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:09:12.517116 systemd[1]: Stopped iscsiuio.service. Dec 13 14:09:12.524677 systemd[1]: Stopped target network.target. Dec 13 14:09:12.539213 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:09:12.539246 systemd[1]: Closed iscsiuio.socket. Dec 13 14:09:12.547651 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:09:12.555588 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:09:12.562964 systemd-networkd[843]: eth0: DHCPv6 lease lost Dec 13 14:09:12.841000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:09:12.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:12.564612 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:09:12.564738 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:09:12.574735 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:09:12.574836 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:09:12.584886 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:09:12.584971 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:09:12.594187 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:09:12.594227 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:09:12.607332 systemd[1]: Stopping network-cleanup.service... Dec 13 14:09:12.618141 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:09:12.618257 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:09:12.922104 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). Dec 13 14:09:12.623955 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:09:12.624016 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:09:12.636442 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:09:12.636489 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:09:12.641579 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:09:12.653112 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:09:12.653683 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:09:12.653813 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:09:12.661608 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:09:12.661698 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:09:12.671364 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:09:12.671430 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:09:12.680236 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:09:12.680290 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:09:12.685421 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:09:12.685487 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:09:12.695049 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:09:12.695092 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:09:12.703258 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:09:12.703311 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:09:12.713048 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:09:12.713091 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:09:12.722256 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:09:12.732126 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:09:12.732204 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:09:12.746091 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:09:12.746139 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:09:12.750905 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:09:12.750948 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:09:12.761772 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:09:12.762326 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:09:12.762420 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:09:12.837458 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:09:12.837563 systemd[1]: Stopped network-cleanup.service. Dec 13 14:09:12.846343 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:09:12.856064 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:09:12.875556 systemd[1]: Switching root. Dec 13 14:09:12.923038 systemd-journald[276]: Journal stopped Dec 13 14:09:25.414330 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:09:25.414350 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:09:25.414360 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:09:25.414370 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:09:25.414378 kernel: SELinux: policy capability open_perms=1 Dec 13 14:09:25.414386 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:09:25.414395 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:09:25.414403 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:09:25.414411 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:09:25.414419 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:09:25.414427 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:09:25.414437 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 14:09:25.414446 kernel: audit: type=1403 audit(1734098955.269:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:09:25.414458 systemd[1]: Successfully loaded SELinux policy in 261.600ms. Dec 13 14:09:25.414469 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.414ms. Dec 13 14:09:25.414480 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:09:25.414490 systemd[1]: Detected virtualization microsoft. Dec 13 14:09:25.414498 systemd[1]: Detected architecture arm64. Dec 13 14:09:25.414507 systemd[1]: Detected first boot. Dec 13 14:09:25.414517 systemd[1]: Hostname set to . Dec 13 14:09:25.414526 systemd[1]: Initializing machine ID from random generator. Dec 13 14:09:25.414535 kernel: audit: type=1400 audit(1734098956.151:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:09:25.414546 kernel: audit: type=1400 audit(1734098956.151:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:09:25.414555 kernel: audit: type=1334 audit(1734098956.168:85): prog-id=10 op=LOAD Dec 13 14:09:25.414563 kernel: audit: type=1334 audit(1734098956.168:86): prog-id=10 op=UNLOAD Dec 13 14:09:25.414571 kernel: audit: type=1334 audit(1734098956.185:87): prog-id=11 op=LOAD Dec 13 14:09:25.414580 kernel: audit: type=1334 audit(1734098956.185:88): prog-id=11 op=UNLOAD Dec 13 14:09:25.414589 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:09:25.414598 kernel: audit: type=1400 audit(1734098957.433:89): avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:09:25.414610 kernel: audit: type=1300 audit(1734098957.433:89): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:25.414619 kernel: audit: type=1327 audit(1734098957.433:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:09:25.414628 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:09:25.414638 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:09:25.414648 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:09:25.414659 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:09:25.414669 kernel: kauditd_printk_skb: 6 callbacks suppressed Dec 13 14:09:25.414678 kernel: audit: type=1334 audit(1734098964.635:91): prog-id=12 op=LOAD Dec 13 14:09:25.414686 kernel: audit: type=1334 audit(1734098964.635:92): prog-id=3 op=UNLOAD Dec 13 14:09:25.414695 kernel: audit: type=1334 audit(1734098964.640:93): prog-id=13 op=LOAD Dec 13 14:09:25.414704 kernel: audit: type=1334 audit(1734098964.646:94): prog-id=14 op=LOAD Dec 13 14:09:25.414714 kernel: audit: type=1334 audit(1734098964.646:95): prog-id=4 op=UNLOAD Dec 13 14:09:25.414723 kernel: audit: type=1334 audit(1734098964.646:96): prog-id=5 op=UNLOAD Dec 13 14:09:25.414732 kernel: audit: type=1334 audit(1734098964.651:97): prog-id=15 op=LOAD Dec 13 14:09:25.414740 kernel: audit: type=1334 audit(1734098964.651:98): prog-id=12 op=UNLOAD Dec 13 14:09:25.414751 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:09:25.414760 kernel: audit: type=1334 audit(1734098964.657:99): prog-id=16 op=LOAD Dec 13 14:09:25.414769 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:09:25.414778 kernel: audit: type=1334 audit(1734098964.662:100): prog-id=17 op=LOAD Dec 13 14:09:25.414787 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:09:25.414796 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:09:25.414806 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:09:25.414816 systemd[1]: Created slice system-getty.slice. Dec 13 14:09:25.414826 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:09:25.414835 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:09:25.414845 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:09:25.414855 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:09:25.414864 systemd[1]: Created slice user.slice. Dec 13 14:09:25.414873 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:09:25.414883 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:09:25.414892 systemd[1]: Set up automount boot.automount. Dec 13 14:09:25.414903 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:09:25.414912 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:09:25.414921 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:09:25.414930 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:09:25.414940 systemd[1]: Reached target integritysetup.target. Dec 13 14:09:25.414949 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:09:25.414958 systemd[1]: Reached target remote-fs.target. Dec 13 14:09:25.414967 systemd[1]: Reached target slices.target. Dec 13 14:09:25.414978 systemd[1]: Reached target swap.target. Dec 13 14:09:25.414988 systemd[1]: Reached target torcx.target. Dec 13 14:09:25.414997 systemd[1]: Reached target veritysetup.target. Dec 13 14:09:25.415006 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:09:25.415015 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:09:25.415025 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:09:25.415036 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:09:25.415046 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:09:25.415056 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:09:25.415065 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:09:25.415075 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:09:25.415084 systemd[1]: Mounting media.mount... Dec 13 14:09:25.415094 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:09:25.415103 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:09:25.415114 systemd[1]: Mounting tmp.mount... Dec 13 14:09:25.415123 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:09:25.415133 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:09:25.415142 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:09:25.415152 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:09:25.415161 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:09:25.415170 systemd[1]: Starting modprobe@drm.service... Dec 13 14:09:25.415179 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:09:25.415189 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:09:25.415199 systemd[1]: Starting modprobe@loop.service... Dec 13 14:09:25.415209 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:09:25.415219 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:09:25.415228 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:09:25.415238 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:09:25.415247 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:09:25.415257 systemd[1]: Stopped systemd-journald.service. Dec 13 14:09:25.415272 kernel: loop: module loaded Dec 13 14:09:25.415284 systemd[1]: systemd-journald.service: Consumed 2.773s CPU time. Dec 13 14:09:25.415294 kernel: fuse: init (API version 7.34) Dec 13 14:09:25.415303 systemd[1]: Starting systemd-journald.service... Dec 13 14:09:25.415312 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:09:25.415322 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:09:25.415331 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:09:25.415340 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:09:25.415350 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:09:25.415359 systemd[1]: Stopped verity-setup.service. Dec 13 14:09:25.415370 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:09:25.415380 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:09:25.415389 systemd[1]: Mounted media.mount. Dec 13 14:09:25.415398 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:09:25.415408 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:09:25.415417 systemd[1]: Mounted tmp.mount. Dec 13 14:09:25.415427 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:09:25.415436 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:09:25.415446 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:09:25.415456 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:09:25.415470 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:09:25.415481 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:09:25.415491 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:09:25.415500 systemd[1]: Finished modprobe@drm.service. Dec 13 14:09:25.415510 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:09:25.415520 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:09:25.415529 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:09:25.415539 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:09:25.415548 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:09:25.415561 systemd-journald[1183]: Journal started Dec 13 14:09:25.415599 systemd-journald[1183]: Runtime Journal (/run/log/journal/207a3b8bb43d47708accd9bd1e9b3a6b) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:09:15.269000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:09:16.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:09:16.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:09:16.168000 audit: BPF prog-id=10 op=LOAD Dec 13 14:09:16.168000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:09:16.185000 audit: BPF prog-id=11 op=LOAD Dec 13 14:09:16.185000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:09:17.433000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:09:17.433000 audit[1076]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:17.433000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:09:17.442000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:09:17.442000 audit[1076]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:17.442000 audit: CWD cwd="/" Dec 13 14:09:17.442000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:17.442000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:17.442000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:09:24.635000 audit: BPF prog-id=12 op=LOAD Dec 13 14:09:24.635000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:09:24.640000 audit: BPF prog-id=13 op=LOAD Dec 13 14:09:24.646000 audit: BPF prog-id=14 op=LOAD Dec 13 14:09:24.646000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:09:24.646000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:09:24.651000 audit: BPF prog-id=15 op=LOAD Dec 13 14:09:24.651000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:09:24.657000 audit: BPF prog-id=16 op=LOAD Dec 13 14:09:24.662000 audit: BPF prog-id=17 op=LOAD Dec 13 14:09:24.662000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:09:24.662000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:09:24.668000 audit: BPF prog-id=18 op=LOAD Dec 13 14:09:24.668000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:09:24.674000 audit: BPF prog-id=19 op=LOAD Dec 13 14:09:24.680000 audit: BPF prog-id=20 op=LOAD Dec 13 14:09:24.680000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:09:24.680000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:09:24.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:24.709000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:09:24.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:24.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.200000 audit: BPF prog-id=21 op=LOAD Dec 13 14:09:25.200000 audit: BPF prog-id=22 op=LOAD Dec 13 14:09:25.200000 audit: BPF prog-id=23 op=LOAD Dec 13 14:09:25.200000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:09:25.200000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:09:25.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.411000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:09:25.411000 audit[1183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffcbc116f0 a2=4000 a3=1 items=0 ppid=1 pid=1183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:25.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.411000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:09:25.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:24.633600 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:09:17.310195 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:09:24.681087 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:09:17.310492 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:09:24.681482 systemd[1]: systemd-journald.service: Consumed 2.773s CPU time. Dec 13 14:09:17.310510 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:09:17.310544 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:09:17.310554 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:09:17.310581 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:09:17.310593 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:09:17.310786 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:09:17.310817 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:09:17.310829 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:09:17.402538 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:09:17.402575 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:09:17.402594 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:09:17.402608 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:09:17.402625 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:09:25.421874 systemd[1]: Finished modprobe@loop.service. Dec 13 14:09:17.402639 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:09:23.390384 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:23Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:09:23.390679 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:23Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:09:23.390790 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:23Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:09:23.390978 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:23Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:09:23.391027 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:23Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:09:23.391092 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:09:23Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:09:25.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.434341 systemd[1]: Started systemd-journald.service. Dec 13 14:09:25.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.435321 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:09:25.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.440940 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:09:25.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.445859 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:09:25.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.450923 systemd[1]: Reached target network-pre.target. Dec 13 14:09:25.456443 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:09:25.461779 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:09:25.465656 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:09:25.466929 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:09:25.472132 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:09:25.476555 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:09:25.477511 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:09:25.481574 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:09:25.482606 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:09:25.487583 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:09:25.493547 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:09:25.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.498399 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:09:25.504199 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:09:25.511392 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:09:25.516767 udevadm[1195]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:09:25.534637 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:09:25.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.539934 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:09:25.545633 systemd-journald[1183]: Time spent on flushing to /var/log/journal/207a3b8bb43d47708accd9bd1e9b3a6b is 14.368ms for 1086 entries. Dec 13 14:09:25.545633 systemd-journald[1183]: System Journal (/var/log/journal/207a3b8bb43d47708accd9bd1e9b3a6b) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:09:25.623104 systemd-journald[1183]: Received client request to flush runtime journal. Dec 13 14:09:25.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.600385 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:09:25.624041 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:09:25.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:26.034337 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:09:26.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:26.040577 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:09:26.450109 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:09:26.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:26.724771 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:09:26.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:26.729000 audit: BPF prog-id=24 op=LOAD Dec 13 14:09:26.729000 audit: BPF prog-id=25 op=LOAD Dec 13 14:09:26.729000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:09:26.729000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:09:26.730783 systemd[1]: Starting systemd-udevd.service... Dec 13 14:09:26.748739 systemd-udevd[1202]: Using default interface naming scheme 'v252'. Dec 13 14:09:26.874678 systemd[1]: Started systemd-udevd.service. Dec 13 14:09:26.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:26.885000 audit: BPF prog-id=26 op=LOAD Dec 13 14:09:26.886041 systemd[1]: Starting systemd-networkd.service... Dec 13 14:09:26.920694 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Dec 13 14:09:26.954000 audit: BPF prog-id=27 op=LOAD Dec 13 14:09:26.954000 audit: BPF prog-id=28 op=LOAD Dec 13 14:09:26.954000 audit: BPF prog-id=29 op=LOAD Dec 13 14:09:26.955582 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:09:26.982000 audit[1217]: AVC avc: denied { confidentiality } for pid=1217 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:09:27.005777 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:09:27.005899 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:09:27.005932 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:09:27.005953 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:09:27.005978 kernel: hv_balloon: Memory hot add disabled on ARM64 Dec 13 14:09:27.006047 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:09:27.018324 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:09:27.026604 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:09:27.026697 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:09:27.031381 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:09:27.042437 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:09:27.042525 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:09:27.042370 systemd[1]: Started systemd-userdbd.service. Dec 13 14:09:27.056812 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:09:27.056917 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:09:26.982000 audit[1217]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafee1bf20 a1=aa2c a2=ffff9b4424b0 a3=aaaafed77010 items=12 ppid=1202 pid=1217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:26.982000 audit: CWD cwd="/" Dec 13 14:09:26.982000 audit: PATH item=0 name=(null) inode=5655 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=1 name=(null) inode=11637 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=2 name=(null) inode=11637 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=3 name=(null) inode=11638 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=4 name=(null) inode=11637 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=5 name=(null) inode=11639 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=6 name=(null) inode=11637 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=7 name=(null) inode=11640 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=8 name=(null) inode=11637 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.843557 systemd-journald[1183]: Time jumped backwards, rotating. Dec 13 14:09:26.982000 audit: PATH item=9 name=(null) inode=11641 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=10 name=(null) inode=11637 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PATH item=11 name=(null) inode=11642 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:26.982000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:09:26.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.056644 systemd-networkd[1223]: lo: Link UP Dec 13 14:09:27.056655 systemd-networkd[1223]: lo: Gained carrier Dec 13 14:09:27.057046 systemd-networkd[1223]: Enumeration completed Dec 13 14:09:27.061231 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1205) Dec 13 14:09:27.057165 systemd[1]: Started systemd-networkd.service. Dec 13 14:09:27.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.063118 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:09:27.082274 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:09:27.088759 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:09:27.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.093862 systemd-networkd[1223]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:09:27.094757 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:09:27.146148 kernel: mlx5_core cf2a:00:02.0 enP53034s1: Link up Dec 13 14:09:27.186137 kernel: hv_netvsc 000d3af6-d59d-000d-3af6-d59d000d3af6 eth0: Data path switched to VF: enP53034s1 Dec 13 14:09:27.186570 systemd-networkd[1223]: enP53034s1: Link UP Dec 13 14:09:27.186775 systemd-networkd[1223]: eth0: Link UP Dec 13 14:09:27.186832 systemd-networkd[1223]: eth0: Gained carrier Dec 13 14:09:27.196497 systemd-networkd[1223]: enP53034s1: Gained carrier Dec 13 14:09:27.206282 systemd-networkd[1223]: eth0: DHCPv4 address 10.200.20.31/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:09:27.346665 lvm[1280]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:09:27.373977 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:09:27.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.379277 systemd[1]: Reached target cryptsetup.target. Dec 13 14:09:27.384836 systemd[1]: Starting lvm2-activation.service... Dec 13 14:09:27.389218 lvm[1281]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:09:27.417205 systemd[1]: Finished lvm2-activation.service. Dec 13 14:09:27.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.422018 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:09:27.427014 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:09:27.427042 systemd[1]: Reached target local-fs.target. Dec 13 14:09:27.431471 systemd[1]: Reached target machines.target. Dec 13 14:09:27.436943 systemd[1]: Starting ldconfig.service... Dec 13 14:09:27.440692 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:09:27.440758 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:09:27.441894 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:09:27.447081 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:09:27.453458 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:09:27.459225 systemd[1]: Starting systemd-sysext.service... Dec 13 14:09:27.494409 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1283 (bootctl) Dec 13 14:09:27.495747 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:09:27.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.776656 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:09:27.795014 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:09:27.796175 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:09:27.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.816790 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:09:27.851835 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:09:27.852021 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:09:27.899149 kernel: loop0: detected capacity change from 0 to 194512 Dec 13 14:09:27.927148 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:09:27.944155 kernel: loop1: detected capacity change from 0 to 194512 Dec 13 14:09:27.947076 (sd-sysext)[1295]: Using extensions 'kubernetes'. Dec 13 14:09:27.947460 (sd-sysext)[1295]: Merged extensions into '/usr'. Dec 13 14:09:27.963875 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:09:27.967838 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:09:27.969000 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:09:27.974075 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:09:27.979139 systemd[1]: Starting modprobe@loop.service... Dec 13 14:09:27.982912 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:09:27.983035 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:09:27.985294 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:09:27.989605 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:09:27.989727 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:09:27.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.994543 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:09:27.994657 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:09:27.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:27.999601 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:09:27.999712 systemd[1]: Finished modprobe@loop.service. Dec 13 14:09:28.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.004411 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:09:28.004507 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:09:28.005699 systemd[1]: Finished systemd-sysext.service. Dec 13 14:09:28.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.011340 systemd[1]: Starting ensure-sysext.service... Dec 13 14:09:28.016683 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:09:28.025053 systemd[1]: Reloading. Dec 13 14:09:28.033765 systemd-tmpfiles[1302]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:09:28.054692 systemd-tmpfiles[1302]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:09:28.065582 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2024-12-13T14:09:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:09:28.065883 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2024-12-13T14:09:28Z" level=info msg="torcx already run" Dec 13 14:09:28.095486 systemd-tmpfiles[1302]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:09:28.133536 systemd-fsck[1290]: fsck.fat 4.2 (2021-01-31) Dec 13 14:09:28.133536 systemd-fsck[1290]: /dev/sda1: 236 files, 117175/258078 clusters Dec 13 14:09:28.147206 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:09:28.147224 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:09:28.162353 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:09:28.222000 audit: BPF prog-id=30 op=LOAD Dec 13 14:09:28.222000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:09:28.222000 audit: BPF prog-id=31 op=LOAD Dec 13 14:09:28.222000 audit: BPF prog-id=32 op=LOAD Dec 13 14:09:28.222000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:09:28.222000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:09:28.223000 audit: BPF prog-id=33 op=LOAD Dec 13 14:09:28.223000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:09:28.223000 audit: BPF prog-id=34 op=LOAD Dec 13 14:09:28.223000 audit: BPF prog-id=35 op=LOAD Dec 13 14:09:28.223000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:09:28.223000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:09:28.226000 audit: BPF prog-id=36 op=LOAD Dec 13 14:09:28.226000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:09:28.226000 audit: BPF prog-id=37 op=LOAD Dec 13 14:09:28.226000 audit: BPF prog-id=38 op=LOAD Dec 13 14:09:28.226000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:09:28.226000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:09:28.229705 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:09:28.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.240963 systemd[1]: Mounting boot.mount... Dec 13 14:09:28.247923 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:09:28.249052 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:09:28.255043 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:09:28.260248 systemd[1]: Starting modprobe@loop.service... Dec 13 14:09:28.264367 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:09:28.264488 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:09:28.266685 systemd[1]: Mounted boot.mount. Dec 13 14:09:28.270744 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:09:28.270895 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:09:28.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.275751 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:09:28.275869 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:09:28.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.280985 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:09:28.281111 systemd[1]: Finished modprobe@loop.service. Dec 13 14:09:28.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.285823 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:09:28.285916 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:09:28.291373 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:09:28.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.297967 systemd[1]: Finished ensure-sysext.service. Dec 13 14:09:28.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.303599 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:09:28.304694 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:09:28.309853 systemd[1]: Starting modprobe@drm.service... Dec 13 14:09:28.314889 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:09:28.319959 systemd[1]: Starting modprobe@loop.service... Dec 13 14:09:28.323816 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:09:28.323887 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:09:28.324480 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:09:28.324611 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:09:28.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.329722 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:09:28.329845 systemd[1]: Finished modprobe@drm.service. Dec 13 14:09:28.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.334787 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:09:28.334904 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:09:28.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.339769 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:09:28.339884 systemd[1]: Finished modprobe@loop.service. Dec 13 14:09:28.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.344885 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:09:28.344927 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:09:28.419318 systemd-networkd[1223]: eth0: Gained IPv6LL Dec 13 14:09:28.422068 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:09:28.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.573632 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:09:28.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.580628 systemd[1]: Starting audit-rules.service... Dec 13 14:09:28.585706 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:09:28.591258 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:09:28.596000 audit: BPF prog-id=39 op=LOAD Dec 13 14:09:28.598250 systemd[1]: Starting systemd-resolved.service... Dec 13 14:09:28.603000 audit: BPF prog-id=40 op=LOAD Dec 13 14:09:28.605165 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:09:28.610212 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:09:28.639000 audit[1400]: SYSTEM_BOOT pid=1400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.643473 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:09:28.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.668449 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:09:28.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.673674 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:09:28.713108 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:09:28.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.717923 systemd[1]: Reached target time-set.target. Dec 13 14:09:28.744242 systemd-resolved[1397]: Positive Trust Anchors: Dec 13 14:09:28.744516 systemd-resolved[1397]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:09:28.744593 systemd-resolved[1397]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:09:28.776561 systemd-resolved[1397]: Using system hostname 'ci-3510.3.6-a-9396bf5055'. Dec 13 14:09:28.778038 systemd[1]: Started systemd-resolved.service. Dec 13 14:09:28.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.782950 systemd[1]: Reached target network.target. Dec 13 14:09:28.787642 systemd[1]: Reached target network-online.target. Dec 13 14:09:28.792324 systemd[1]: Reached target nss-lookup.target. Dec 13 14:09:28.907511 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:09:28.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:28.981000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:09:28.981000 audit[1415]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc9316420 a2=420 a3=0 items=0 ppid=1394 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:28.981000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:09:28.998679 augenrules[1415]: No rules Dec 13 14:09:28.999631 systemd[1]: Finished audit-rules.service. Dec 13 14:09:29.088590 systemd-timesyncd[1399]: Contacted time server 216.31.16.12:123 (0.flatcar.pool.ntp.org). Dec 13 14:09:29.088656 systemd-timesyncd[1399]: Initial clock synchronization to Fri 2024-12-13 14:09:29.086370 UTC. Dec 13 14:09:35.233319 ldconfig[1282]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:09:35.246009 systemd[1]: Finished ldconfig.service. Dec 13 14:09:35.252065 systemd[1]: Starting systemd-update-done.service... Dec 13 14:09:35.292714 systemd[1]: Finished systemd-update-done.service. Dec 13 14:09:35.297629 systemd[1]: Reached target sysinit.target. Dec 13 14:09:35.302164 systemd[1]: Started motdgen.path. Dec 13 14:09:35.305806 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:09:35.312205 systemd[1]: Started logrotate.timer. Dec 13 14:09:35.316872 systemd[1]: Started mdadm.timer. Dec 13 14:09:35.320801 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:09:35.325794 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:09:35.325831 systemd[1]: Reached target paths.target. Dec 13 14:09:35.330049 systemd[1]: Reached target timers.target. Dec 13 14:09:35.336179 systemd[1]: Listening on dbus.socket. Dec 13 14:09:35.341262 systemd[1]: Starting docker.socket... Dec 13 14:09:35.346981 systemd[1]: Listening on sshd.socket. Dec 13 14:09:35.351322 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:09:35.351836 systemd[1]: Listening on docker.socket. Dec 13 14:09:35.356154 systemd[1]: Reached target sockets.target. Dec 13 14:09:35.360339 systemd[1]: Reached target basic.target. Dec 13 14:09:35.364508 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:09:35.364540 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:09:35.365693 systemd[1]: Starting containerd.service... Dec 13 14:09:35.370447 systemd[1]: Starting dbus.service... Dec 13 14:09:35.374878 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:09:35.380568 systemd[1]: Starting extend-filesystems.service... Dec 13 14:09:35.385070 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:09:35.386393 systemd[1]: Starting kubelet.service... Dec 13 14:09:35.390909 systemd[1]: Starting motdgen.service... Dec 13 14:09:35.395476 systemd[1]: Started nvidia.service. Dec 13 14:09:35.400796 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:09:35.408464 systemd[1]: Starting sshd-keygen.service... Dec 13 14:09:35.414621 systemd[1]: Starting systemd-logind.service... Dec 13 14:09:35.418493 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:09:35.418557 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:09:35.418955 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:09:35.419630 systemd[1]: Starting update-engine.service... Dec 13 14:09:35.424439 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:09:35.437559 jq[1436]: true Dec 13 14:09:35.441826 jq[1425]: false Dec 13 14:09:35.459747 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:09:35.459944 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:09:35.469275 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:09:35.469430 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:09:35.480739 extend-filesystems[1426]: Found loop1 Dec 13 14:09:35.480739 extend-filesystems[1426]: Found sda Dec 13 14:09:35.480739 extend-filesystems[1426]: Found sda1 Dec 13 14:09:35.480739 extend-filesystems[1426]: Found sda2 Dec 13 14:09:35.480739 extend-filesystems[1426]: Found sda3 Dec 13 14:09:35.480739 extend-filesystems[1426]: Found usr Dec 13 14:09:35.480739 extend-filesystems[1426]: Found sda4 Dec 13 14:09:35.480739 extend-filesystems[1426]: Found sda6 Dec 13 14:09:35.480739 extend-filesystems[1426]: Found sda7 Dec 13 14:09:35.480739 extend-filesystems[1426]: Found sda9 Dec 13 14:09:35.515373 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:09:35.548896 jq[1439]: true Dec 13 14:09:35.548984 extend-filesystems[1426]: Checking size of /dev/sda9 Dec 13 14:09:35.515545 systemd[1]: Finished motdgen.service. Dec 13 14:09:35.567714 env[1449]: time="2024-12-13T14:09:35.563537896Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:09:35.568848 systemd-logind[1434]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 13 14:09:35.575213 systemd-logind[1434]: New seat seat0. Dec 13 14:09:35.608266 extend-filesystems[1426]: Old size kept for /dev/sda9 Dec 13 14:09:35.608266 extend-filesystems[1426]: Found sr0 Dec 13 14:09:35.615206 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:09:35.615373 systemd[1]: Finished extend-filesystems.service. Dec 13 14:09:35.631066 env[1449]: time="2024-12-13T14:09:35.630733312Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:09:35.631066 env[1449]: time="2024-12-13T14:09:35.630882858Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:09:35.639494 env[1449]: time="2024-12-13T14:09:35.639428681Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:09:35.639592 env[1449]: time="2024-12-13T14:09:35.639576827Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:09:35.640790 env[1449]: time="2024-12-13T14:09:35.640762794Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:09:35.641788 env[1449]: time="2024-12-13T14:09:35.641764738Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:09:35.642179 env[1449]: time="2024-12-13T14:09:35.642159700Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:09:35.642241 env[1449]: time="2024-12-13T14:09:35.642227614Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:09:35.642786 env[1449]: time="2024-12-13T14:09:35.642766202Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:09:35.643056 env[1449]: time="2024-12-13T14:09:35.643036776Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:09:35.643696 env[1449]: time="2024-12-13T14:09:35.643668716Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:09:35.644587 env[1449]: time="2024-12-13T14:09:35.644565710Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:09:35.646685 env[1449]: time="2024-12-13T14:09:35.646660590Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:09:35.646769 env[1449]: time="2024-12-13T14:09:35.646754581Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:09:35.656557 bash[1474]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:09:35.657462 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:09:35.667213 env[1449]: time="2024-12-13T14:09:35.666681276Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:09:35.667213 env[1449]: time="2024-12-13T14:09:35.666720793Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:09:35.667213 env[1449]: time="2024-12-13T14:09:35.666767628Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:09:35.667213 env[1449]: time="2024-12-13T14:09:35.666804425Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:09:35.667213 env[1449]: time="2024-12-13T14:09:35.666832702Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:09:35.667213 env[1449]: time="2024-12-13T14:09:35.666847180Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:09:35.667213 env[1449]: time="2024-12-13T14:09:35.666860099Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:09:35.667504 env[1449]: time="2024-12-13T14:09:35.667470121Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:09:35.667586 env[1449]: time="2024-12-13T14:09:35.667557952Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:09:35.667665 env[1449]: time="2024-12-13T14:09:35.667639385Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:09:35.667753 env[1449]: time="2024-12-13T14:09:35.667738415Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:09:35.667839 env[1449]: time="2024-12-13T14:09:35.667825087Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:09:35.668038 env[1449]: time="2024-12-13T14:09:35.668022708Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:09:35.668246 env[1449]: time="2024-12-13T14:09:35.668230208Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:09:35.669105 env[1449]: time="2024-12-13T14:09:35.669082967Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:09:35.669235 env[1449]: time="2024-12-13T14:09:35.669218954Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.669369 env[1449]: time="2024-12-13T14:09:35.669334383Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:09:35.669486 env[1449]: time="2024-12-13T14:09:35.669471210Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.669558 env[1449]: time="2024-12-13T14:09:35.669545642Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.669626 env[1449]: time="2024-12-13T14:09:35.669601557Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.669699 env[1449]: time="2024-12-13T14:09:35.669676510Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.669755 env[1449]: time="2024-12-13T14:09:35.669742904Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.669820 env[1449]: time="2024-12-13T14:09:35.669808137Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.669888 env[1449]: time="2024-12-13T14:09:35.669863812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.669955 env[1449]: time="2024-12-13T14:09:35.669935285Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.670024 env[1449]: time="2024-12-13T14:09:35.670011158Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:09:35.670334 env[1449]: time="2024-12-13T14:09:35.670306570Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.670417 env[1449]: time="2024-12-13T14:09:35.670404080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.670490 env[1449]: time="2024-12-13T14:09:35.670477353Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.670556 env[1449]: time="2024-12-13T14:09:35.670533588Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:09:35.670616 env[1449]: time="2024-12-13T14:09:35.670601182Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:09:35.670691 env[1449]: time="2024-12-13T14:09:35.670678494Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:09:35.670769 env[1449]: time="2024-12-13T14:09:35.670755007Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:09:35.670893 env[1449]: time="2024-12-13T14:09:35.670853238Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:09:35.671307 env[1449]: time="2024-12-13T14:09:35.671242400Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.671500256Z" level=info msg="Connect containerd service" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.671539292Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.672757455Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.672958276Z" level=info msg="Start subscribing containerd event" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.673017191Z" level=info msg="Start recovering state" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.673077785Z" level=info msg="Start event monitor" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.673078545Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.673093463Z" level=info msg="Start snapshots syncer" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.673103462Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.673111302Z" level=info msg="Start streaming server" Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.673118541Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:09:35.688381 env[1449]: time="2024-12-13T14:09:35.673206573Z" level=info msg="containerd successfully booted in 0.117480s" Dec 13 14:09:35.673277 systemd[1]: Started containerd.service. Dec 13 14:09:35.695722 dbus-daemon[1424]: [system] SELinux support is enabled Dec 13 14:09:35.695899 systemd[1]: Started dbus.service. Dec 13 14:09:35.701390 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:09:35.701417 systemd[1]: Reached target system-config.target. Dec 13 14:09:35.708505 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:09:35.708529 systemd[1]: Reached target user-config.target. Dec 13 14:09:35.716512 systemd[1]: Started systemd-logind.service. Dec 13 14:09:35.736155 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:09:36.111950 update_engine[1435]: I1213 14:09:36.096619 1435 main.cc:92] Flatcar Update Engine starting Dec 13 14:09:36.117276 systemd[1]: Started kubelet.service. Dec 13 14:09:36.162386 systemd[1]: Started update-engine.service. Dec 13 14:09:36.169003 update_engine[1435]: I1213 14:09:36.168969 1435 update_check_scheduler.cc:74] Next update check in 10m26s Dec 13 14:09:36.169600 systemd[1]: Started locksmithd.service. Dec 13 14:09:36.575429 kubelet[1525]: E1213 14:09:36.575300 1525 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:09:36.577341 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:09:36.577468 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:09:37.394990 locksmithd[1526]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:09:37.514202 sshd_keygen[1443]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:09:37.530886 systemd[1]: Finished sshd-keygen.service. Dec 13 14:09:37.536737 systemd[1]: Starting issuegen.service... Dec 13 14:09:37.541347 systemd[1]: Started waagent.service. Dec 13 14:09:37.545834 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:09:37.545991 systemd[1]: Finished issuegen.service. Dec 13 14:09:37.551208 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:09:37.577958 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:09:37.584101 systemd[1]: Started getty@tty1.service. Dec 13 14:09:37.589523 systemd[1]: Started serial-getty@ttyAMA0.service. Dec 13 14:09:37.594358 systemd[1]: Reached target getty.target. Dec 13 14:09:37.598458 systemd[1]: Reached target multi-user.target. Dec 13 14:09:37.604064 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:09:37.612070 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:09:37.612274 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:09:37.619271 systemd[1]: Startup finished in 724ms (kernel) + 14.189s (initrd) + 23.053s (userspace) = 37.967s. Dec 13 14:09:38.309755 login[1551]: pam_lastlog(login:session): file /var/log/lastlog is locked/read Dec 13 14:09:38.326485 login[1550]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:09:38.379930 systemd[1]: Created slice user-500.slice. Dec 13 14:09:38.381187 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:09:38.383166 systemd-logind[1434]: New session 1 of user core. Dec 13 14:09:38.421308 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:09:38.422865 systemd[1]: Starting user@500.service... Dec 13 14:09:38.471867 (systemd)[1554]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:38.753873 systemd[1554]: Queued start job for default target default.target. Dec 13 14:09:38.754437 systemd[1554]: Reached target paths.target. Dec 13 14:09:38.754459 systemd[1554]: Reached target sockets.target. Dec 13 14:09:38.754470 systemd[1554]: Reached target timers.target. Dec 13 14:09:38.754480 systemd[1554]: Reached target basic.target. Dec 13 14:09:38.754527 systemd[1554]: Reached target default.target. Dec 13 14:09:38.754556 systemd[1554]: Startup finished in 276ms. Dec 13 14:09:38.754593 systemd[1]: Started user@500.service. Dec 13 14:09:38.755493 systemd[1]: Started session-1.scope. Dec 13 14:09:39.314663 login[1551]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:09:39.318842 systemd-logind[1434]: New session 2 of user core. Dec 13 14:09:39.319239 systemd[1]: Started session-2.scope. Dec 13 14:09:43.783618 waagent[1547]: 2024-12-13T14:09:43.783515Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:09:43.790560 waagent[1547]: 2024-12-13T14:09:43.790491Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:09:43.795256 waagent[1547]: 2024-12-13T14:09:43.795197Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:09:43.799823 waagent[1547]: 2024-12-13T14:09:43.799731Z INFO Daemon Daemon Run daemon Dec 13 14:09:43.804162 waagent[1547]: 2024-12-13T14:09:43.804097Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:09:43.821336 waagent[1547]: 2024-12-13T14:09:43.821212Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:09:43.836415 waagent[1547]: 2024-12-13T14:09:43.836291Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:09:43.846440 waagent[1547]: 2024-12-13T14:09:43.846361Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:09:43.851602 waagent[1547]: 2024-12-13T14:09:43.851537Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:09:43.857675 waagent[1547]: 2024-12-13T14:09:43.857615Z INFO Daemon Daemon Activate resource disk Dec 13 14:09:43.862517 waagent[1547]: 2024-12-13T14:09:43.862458Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:09:43.876982 waagent[1547]: 2024-12-13T14:09:43.876918Z INFO Daemon Daemon Found device: None Dec 13 14:09:43.881744 waagent[1547]: 2024-12-13T14:09:43.881684Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:09:43.890768 waagent[1547]: 2024-12-13T14:09:43.890704Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:09:43.902931 waagent[1547]: 2024-12-13T14:09:43.902872Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:09:43.908843 waagent[1547]: 2024-12-13T14:09:43.908786Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:09:43.922444 waagent[1547]: 2024-12-13T14:09:43.922321Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:09:43.937518 waagent[1547]: 2024-12-13T14:09:43.937404Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:09:43.947383 waagent[1547]: 2024-12-13T14:09:43.947313Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:09:43.952483 waagent[1547]: 2024-12-13T14:09:43.952422Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:09:44.030963 waagent[1547]: 2024-12-13T14:09:44.030834Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:09:44.082736 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:09:44.128508 waagent[1547]: 2024-12-13T14:09:44.128367Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:09:44.133563 waagent[1547]: 2024-12-13T14:09:44.133494Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:09:44.139769 waagent[1547]: 2024-12-13T14:09:44.139700Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:09:44.146438 waagent[1547]: 2024-12-13T14:09:44.146379Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:09:44.151998 waagent[1547]: 2024-12-13T14:09:44.151938Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:09:44.157306 waagent[1547]: 2024-12-13T14:09:44.157250Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:09:44.287480 waagent[1547]: 2024-12-13T14:09:44.287407Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:09:44.294665 waagent[1547]: 2024-12-13T14:09:44.294620Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:09:44.300127 waagent[1547]: 2024-12-13T14:09:44.300064Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:09:44.896342 waagent[1547]: 2024-12-13T14:09:44.896196Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:09:44.911939 waagent[1547]: 2024-12-13T14:09:44.911867Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:09:44.917783 waagent[1547]: 2024-12-13T14:09:44.917722Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:09:45.005743 waagent[1547]: 2024-12-13T14:09:45.005608Z INFO Daemon Daemon Found private key matching thumbprint 051F7F177B84541EE31F9AEB037AD5D522D0082B Dec 13 14:09:45.014165 waagent[1547]: 2024-12-13T14:09:45.014079Z INFO Daemon Daemon Certificate with thumbprint ECAD9D41B4346780A067C50C85C660008024CCA9 has no matching private key. Dec 13 14:09:45.024608 waagent[1547]: 2024-12-13T14:09:45.024535Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:09:45.094282 waagent[1547]: 2024-12-13T14:09:45.094217Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: baed7c3a-9509-4ec5-b696-4ab88cc79081 New eTag: 13010695476990056936] Dec 13 14:09:45.106314 waagent[1547]: 2024-12-13T14:09:45.106230Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:09:45.123892 waagent[1547]: 2024-12-13T14:09:45.123822Z INFO Daemon Daemon Starting provisioning Dec 13 14:09:45.129995 waagent[1547]: 2024-12-13T14:09:45.129922Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:09:45.134849 waagent[1547]: 2024-12-13T14:09:45.134791Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-9396bf5055] Dec 13 14:09:45.175365 waagent[1547]: 2024-12-13T14:09:45.175233Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-9396bf5055] Dec 13 14:09:45.182016 waagent[1547]: 2024-12-13T14:09:45.181944Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:09:45.188685 waagent[1547]: 2024-12-13T14:09:45.188626Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:09:45.204799 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:09:45.204958 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:09:45.205016 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:09:45.205262 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:09:45.216198 systemd-networkd[1223]: eth0: DHCPv6 lease lost Dec 13 14:09:45.218080 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:09:45.218267 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:09:45.220368 systemd[1]: Starting systemd-networkd.service... Dec 13 14:09:45.246855 systemd-networkd[1598]: enP53034s1: Link UP Dec 13 14:09:45.246867 systemd-networkd[1598]: enP53034s1: Gained carrier Dec 13 14:09:45.247746 systemd-networkd[1598]: eth0: Link UP Dec 13 14:09:45.247755 systemd-networkd[1598]: eth0: Gained carrier Dec 13 14:09:45.248058 systemd-networkd[1598]: lo: Link UP Dec 13 14:09:45.248067 systemd-networkd[1598]: lo: Gained carrier Dec 13 14:09:45.248367 systemd-networkd[1598]: eth0: Gained IPv6LL Dec 13 14:09:45.249743 systemd-networkd[1598]: Enumeration completed Dec 13 14:09:45.249845 systemd[1]: Started systemd-networkd.service. Dec 13 14:09:45.251427 systemd-networkd[1598]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:09:45.251550 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:09:45.255559 waagent[1547]: 2024-12-13T14:09:45.255382Z INFO Daemon Daemon Create user account if not exists Dec 13 14:09:45.261751 waagent[1547]: 2024-12-13T14:09:45.261678Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:09:45.267915 waagent[1547]: 2024-12-13T14:09:45.267840Z INFO Daemon Daemon Configure sudoer Dec 13 14:09:45.273234 waagent[1547]: 2024-12-13T14:09:45.273149Z INFO Daemon Daemon Configure sshd Dec 13 14:09:45.277836 waagent[1547]: 2024-12-13T14:09:45.277757Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:09:45.283196 systemd-networkd[1598]: eth0: DHCPv4 address 10.200.20.31/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:09:45.287252 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:09:46.447238 waagent[1547]: 2024-12-13T14:09:46.447170Z INFO Daemon Daemon Provisioning complete Dec 13 14:09:46.466804 waagent[1547]: 2024-12-13T14:09:46.466740Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:09:46.473148 waagent[1547]: 2024-12-13T14:09:46.473073Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:09:46.483899 waagent[1547]: 2024-12-13T14:09:46.483837Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:09:46.744469 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:09:46.744641 systemd[1]: Stopped kubelet.service. Dec 13 14:09:46.745963 systemd[1]: Starting kubelet.service... Dec 13 14:09:46.783408 waagent[1607]: 2024-12-13T14:09:46.783312Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:09:46.784529 waagent[1607]: 2024-12-13T14:09:46.784469Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:09:46.784777 waagent[1607]: 2024-12-13T14:09:46.784728Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:09:46.797864 waagent[1607]: 2024-12-13T14:09:46.797766Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:09:46.798237 waagent[1607]: 2024-12-13T14:09:46.798184Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:09:46.825889 systemd[1]: Started kubelet.service. Dec 13 14:09:46.888053 waagent[1607]: 2024-12-13T14:09:46.887920Z INFO ExtHandler ExtHandler Found private key matching thumbprint 051F7F177B84541EE31F9AEB037AD5D522D0082B Dec 13 14:09:46.888329 waagent[1607]: 2024-12-13T14:09:46.888265Z INFO ExtHandler ExtHandler Certificate with thumbprint ECAD9D41B4346780A067C50C85C660008024CCA9 has no matching private key. Dec 13 14:09:46.888566 waagent[1607]: 2024-12-13T14:09:46.888509Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:09:46.898364 kubelet[1614]: E1213 14:09:46.898311 1614 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:09:46.900895 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:09:46.901028 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:09:46.905160 waagent[1607]: 2024-12-13T14:09:46.905093Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 1cc72c1c-2298-4ad7-9e91-535063e3433d New eTag: 13010695476990056936] Dec 13 14:09:46.905764 waagent[1607]: 2024-12-13T14:09:46.905700Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:09:47.254987 waagent[1607]: 2024-12-13T14:09:47.254843Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:09:47.283974 waagent[1607]: 2024-12-13T14:09:47.283894Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1607 Dec 13 14:09:47.287726 waagent[1607]: 2024-12-13T14:09:47.287660Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:09:47.289065 waagent[1607]: 2024-12-13T14:09:47.289007Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:09:47.409280 waagent[1607]: 2024-12-13T14:09:47.409211Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:09:47.409711 waagent[1607]: 2024-12-13T14:09:47.409653Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:09:47.417547 waagent[1607]: 2024-12-13T14:09:47.417487Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:09:47.418030 waagent[1607]: 2024-12-13T14:09:47.417971Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:09:47.419165 waagent[1607]: 2024-12-13T14:09:47.419083Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:09:47.420493 waagent[1607]: 2024-12-13T14:09:47.420422Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:09:47.421161 waagent[1607]: 2024-12-13T14:09:47.421078Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:09:47.421472 waagent[1607]: 2024-12-13T14:09:47.421417Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:09:47.422084 waagent[1607]: 2024-12-13T14:09:47.422032Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:09:47.422482 waagent[1607]: 2024-12-13T14:09:47.422426Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:09:47.422482 waagent[1607]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:09:47.422482 waagent[1607]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:09:47.422482 waagent[1607]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:09:47.422482 waagent[1607]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:09:47.422482 waagent[1607]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:09:47.422482 waagent[1607]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:09:47.424754 waagent[1607]: 2024-12-13T14:09:47.424605Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:09:47.425532 waagent[1607]: 2024-12-13T14:09:47.425472Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:09:47.425800 waagent[1607]: 2024-12-13T14:09:47.425750Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:09:47.426457 waagent[1607]: 2024-12-13T14:09:47.426397Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:09:47.426692 waagent[1607]: 2024-12-13T14:09:47.426646Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:09:47.426885 waagent[1607]: 2024-12-13T14:09:47.426842Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:09:47.427855 waagent[1607]: 2024-12-13T14:09:47.427798Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:09:47.427946 waagent[1607]: 2024-12-13T14:09:47.427879Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:09:47.428925 waagent[1607]: 2024-12-13T14:09:47.428837Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:09:47.429014 waagent[1607]: 2024-12-13T14:09:47.428950Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:09:47.429541 waagent[1607]: 2024-12-13T14:09:47.429470Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:09:47.439849 waagent[1607]: 2024-12-13T14:09:47.439772Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:09:47.440563 waagent[1607]: 2024-12-13T14:09:47.440500Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:09:47.442521 waagent[1607]: 2024-12-13T14:09:47.442453Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:09:47.475039 waagent[1607]: 2024-12-13T14:09:47.474926Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1598' Dec 13 14:09:47.486663 waagent[1607]: 2024-12-13T14:09:47.486596Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:09:47.569914 waagent[1607]: 2024-12-13T14:09:47.569767Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:09:47.569914 waagent[1607]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:09:47.569914 waagent[1607]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:09:47.569914 waagent[1607]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f6:d5:9d brd ff:ff:ff:ff:ff:ff Dec 13 14:09:47.569914 waagent[1607]: 3: enP53034s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f6:d5:9d brd ff:ff:ff:ff:ff:ff\ altname enP53034p0s2 Dec 13 14:09:47.569914 waagent[1607]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:09:47.569914 waagent[1607]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:09:47.569914 waagent[1607]: 2: eth0 inet 10.200.20.31/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:09:47.569914 waagent[1607]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:09:47.569914 waagent[1607]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:09:47.569914 waagent[1607]: 2: eth0 inet6 fe80::20d:3aff:fef6:d59d/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:09:47.855524 waagent[1607]: 2024-12-13T14:09:47.855408Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:09:48.487566 waagent[1547]: 2024-12-13T14:09:48.487411Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:09:48.494021 waagent[1547]: 2024-12-13T14:09:48.493968Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:09:49.715173 waagent[1647]: 2024-12-13T14:09:49.715062Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:09:49.716216 waagent[1647]: 2024-12-13T14:09:49.716159Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:09:49.716439 waagent[1647]: 2024-12-13T14:09:49.716393Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:09:49.716660 waagent[1647]: 2024-12-13T14:09:49.716615Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Dec 13 14:09:49.725039 waagent[1647]: 2024-12-13T14:09:49.724946Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:09:49.725554 waagent[1647]: 2024-12-13T14:09:49.725501Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:09:49.725795 waagent[1647]: 2024-12-13T14:09:49.725749Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:09:49.738823 waagent[1647]: 2024-12-13T14:09:49.738759Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:09:49.747568 waagent[1647]: 2024-12-13T14:09:49.747519Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:09:49.748668 waagent[1647]: 2024-12-13T14:09:49.748614Z INFO ExtHandler Dec 13 14:09:49.748911 waagent[1647]: 2024-12-13T14:09:49.748855Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 975a0b56-5fdb-4c05-8748-b2d2d6a12d28 eTag: 13010695476990056936 source: Fabric] Dec 13 14:09:49.749748 waagent[1647]: 2024-12-13T14:09:49.749694Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:09:49.751040 waagent[1647]: 2024-12-13T14:09:49.750984Z INFO ExtHandler Dec 13 14:09:49.751285 waagent[1647]: 2024-12-13T14:09:49.751237Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:09:49.757794 waagent[1647]: 2024-12-13T14:09:49.757750Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:09:49.758342 waagent[1647]: 2024-12-13T14:09:49.758296Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:09:49.777685 waagent[1647]: 2024-12-13T14:09:49.777631Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:09:49.845609 waagent[1647]: 2024-12-13T14:09:49.845478Z INFO ExtHandler Downloaded certificate {'thumbprint': 'ECAD9D41B4346780A067C50C85C660008024CCA9', 'hasPrivateKey': False} Dec 13 14:09:49.849723 waagent[1647]: 2024-12-13T14:09:49.849658Z INFO ExtHandler Downloaded certificate {'thumbprint': '051F7F177B84541EE31F9AEB037AD5D522D0082B', 'hasPrivateKey': True} Dec 13 14:09:49.850864 waagent[1647]: 2024-12-13T14:09:49.850808Z INFO ExtHandler Fetch goal state completed Dec 13 14:09:49.871216 waagent[1647]: 2024-12-13T14:09:49.871088Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:09:49.883949 waagent[1647]: 2024-12-13T14:09:49.883854Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1647 Dec 13 14:09:49.887472 waagent[1647]: 2024-12-13T14:09:49.887408Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:09:49.888660 waagent[1647]: 2024-12-13T14:09:49.888606Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:09:49.889049 waagent[1647]: 2024-12-13T14:09:49.888997Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:09:49.891332 waagent[1647]: 2024-12-13T14:09:49.891276Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:09:49.896500 waagent[1647]: 2024-12-13T14:09:49.896452Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:09:49.896972 waagent[1647]: 2024-12-13T14:09:49.896919Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:09:49.904716 waagent[1647]: 2024-12-13T14:09:49.904668Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:09:49.905318 waagent[1647]: 2024-12-13T14:09:49.905263Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:09:49.911316 waagent[1647]: 2024-12-13T14:09:49.911228Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Dec 13 14:09:49.912562 waagent[1647]: 2024-12-13T14:09:49.912500Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:09:49.914182 waagent[1647]: 2024-12-13T14:09:49.914080Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:09:49.914474 waagent[1647]: 2024-12-13T14:09:49.914404Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:09:49.915053 waagent[1647]: 2024-12-13T14:09:49.914975Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:09:49.915687 waagent[1647]: 2024-12-13T14:09:49.915621Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:09:49.915996 waagent[1647]: 2024-12-13T14:09:49.915939Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:09:49.915996 waagent[1647]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:09:49.915996 waagent[1647]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:09:49.915996 waagent[1647]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:09:49.915996 waagent[1647]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:09:49.915996 waagent[1647]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:09:49.915996 waagent[1647]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:09:49.918389 waagent[1647]: 2024-12-13T14:09:49.918280Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:09:49.918643 waagent[1647]: 2024-12-13T14:09:49.918575Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:09:49.920177 waagent[1647]: 2024-12-13T14:09:49.919327Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:09:49.922018 waagent[1647]: 2024-12-13T14:09:49.921892Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:09:49.922342 waagent[1647]: 2024-12-13T14:09:49.922271Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:09:49.922536 waagent[1647]: 2024-12-13T14:09:49.922475Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:09:49.923273 waagent[1647]: 2024-12-13T14:09:49.923197Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:09:49.923602 waagent[1647]: 2024-12-13T14:09:49.923541Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:09:49.923881 waagent[1647]: 2024-12-13T14:09:49.923806Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:09:49.924217 waagent[1647]: 2024-12-13T14:09:49.924155Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:09:49.924772 waagent[1647]: 2024-12-13T14:09:49.924703Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:09:49.930629 waagent[1647]: 2024-12-13T14:09:49.930488Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:09:49.930629 waagent[1647]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:09:49.930629 waagent[1647]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:09:49.930629 waagent[1647]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f6:d5:9d brd ff:ff:ff:ff:ff:ff Dec 13 14:09:49.930629 waagent[1647]: 3: enP53034s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f6:d5:9d brd ff:ff:ff:ff:ff:ff\ altname enP53034p0s2 Dec 13 14:09:49.930629 waagent[1647]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:09:49.930629 waagent[1647]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:09:49.930629 waagent[1647]: 2: eth0 inet 10.200.20.31/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:09:49.930629 waagent[1647]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:09:49.930629 waagent[1647]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:09:49.930629 waagent[1647]: 2: eth0 inet6 fe80::20d:3aff:fef6:d59d/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:09:49.942452 waagent[1647]: 2024-12-13T14:09:49.942356Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:09:49.961525 waagent[1647]: 2024-12-13T14:09:49.961385Z INFO ExtHandler ExtHandler Dec 13 14:09:49.963264 waagent[1647]: 2024-12-13T14:09:49.963192Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 9b2be8e6-0946-4cd4-8a4f-85df9755fd69 correlation a35c2f21-f663-4fe9-a8de-373608e74947 created: 2024-12-13T14:08:14.962212Z] Dec 13 14:09:49.965842 waagent[1647]: 2024-12-13T14:09:49.965744Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:09:49.971049 waagent[1647]: 2024-12-13T14:09:49.970993Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 9 ms] Dec 13 14:09:49.997533 waagent[1647]: 2024-12-13T14:09:49.997456Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:09:50.017943 waagent[1647]: 2024-12-13T14:09:50.017859Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: C692CA61-3AE2-4AA0-8EA6-5E661031DA27;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:09:50.164976 waagent[1647]: 2024-12-13T14:09:50.164857Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Dec 13 14:09:50.164976 waagent[1647]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:09:50.164976 waagent[1647]: pkts bytes target prot opt in out source destination Dec 13 14:09:50.164976 waagent[1647]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:09:50.164976 waagent[1647]: pkts bytes target prot opt in out source destination Dec 13 14:09:50.164976 waagent[1647]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:09:50.164976 waagent[1647]: pkts bytes target prot opt in out source destination Dec 13 14:09:50.164976 waagent[1647]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:09:50.164976 waagent[1647]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:09:50.164976 waagent[1647]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:09:50.172716 waagent[1647]: 2024-12-13T14:09:50.172608Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:09:50.172716 waagent[1647]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:09:50.172716 waagent[1647]: pkts bytes target prot opt in out source destination Dec 13 14:09:50.172716 waagent[1647]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:09:50.172716 waagent[1647]: pkts bytes target prot opt in out source destination Dec 13 14:09:50.172716 waagent[1647]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:09:50.172716 waagent[1647]: pkts bytes target prot opt in out source destination Dec 13 14:09:50.172716 waagent[1647]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:09:50.172716 waagent[1647]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:09:50.172716 waagent[1647]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:09:50.173577 waagent[1647]: 2024-12-13T14:09:50.173530Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:09:56.994612 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:09:56.994786 systemd[1]: Stopped kubelet.service. Dec 13 14:09:56.996140 systemd[1]: Starting kubelet.service... Dec 13 14:09:57.072054 systemd[1]: Started kubelet.service. Dec 13 14:09:57.128151 kubelet[1702]: E1213 14:09:57.128077 1702 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:09:57.130513 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:09:57.130634 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:10:07.244595 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:10:07.244753 systemd[1]: Stopped kubelet.service. Dec 13 14:10:07.246111 systemd[1]: Starting kubelet.service... Dec 13 14:10:07.320955 systemd[1]: Started kubelet.service. Dec 13 14:10:07.356598 kubelet[1712]: E1213 14:10:07.356534 1712 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:10:07.358840 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:10:07.358965 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:10:14.868877 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Dec 13 14:10:17.494594 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:10:17.494761 systemd[1]: Stopped kubelet.service. Dec 13 14:10:17.496146 systemd[1]: Starting kubelet.service... Dec 13 14:10:17.569505 systemd[1]: Started kubelet.service. Dec 13 14:10:17.679973 kubelet[1722]: E1213 14:10:17.679906 1722 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:10:17.682352 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:10:17.682472 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:10:21.683240 update_engine[1435]: I1213 14:10:21.683187 1435 update_attempter.cc:509] Updating boot flags... Dec 13 14:10:22.383903 systemd[1]: Created slice system-sshd.slice. Dec 13 14:10:22.385351 systemd[1]: Started sshd@0-10.200.20.31:22-10.200.16.10:43648.service. Dec 13 14:10:22.997357 sshd[1768]: Accepted publickey for core from 10.200.16.10 port 43648 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:23.014694 sshd[1768]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:23.018932 systemd[1]: Started session-3.scope. Dec 13 14:10:23.019898 systemd-logind[1434]: New session 3 of user core. Dec 13 14:10:23.381047 systemd[1]: Started sshd@1-10.200.20.31:22-10.200.16.10:43652.service. Dec 13 14:10:23.808178 sshd[1773]: Accepted publickey for core from 10.200.16.10 port 43652 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:23.809452 sshd[1773]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:23.813181 systemd-logind[1434]: New session 4 of user core. Dec 13 14:10:23.813593 systemd[1]: Started session-4.scope. Dec 13 14:10:24.145247 sshd[1773]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:24.147877 systemd[1]: sshd@1-10.200.20.31:22-10.200.16.10:43652.service: Deactivated successfully. Dec 13 14:10:24.148571 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:10:24.149105 systemd-logind[1434]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:10:24.150055 systemd-logind[1434]: Removed session 4. Dec 13 14:10:24.213632 systemd[1]: Started sshd@2-10.200.20.31:22-10.200.16.10:43666.service. Dec 13 14:10:24.628820 sshd[1779]: Accepted publickey for core from 10.200.16.10 port 43666 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:24.630376 sshd[1779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:24.634440 systemd[1]: Started session-5.scope. Dec 13 14:10:24.635178 systemd-logind[1434]: New session 5 of user core. Dec 13 14:10:24.945294 sshd[1779]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:24.947894 systemd[1]: sshd@2-10.200.20.31:22-10.200.16.10:43666.service: Deactivated successfully. Dec 13 14:10:24.948571 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:10:24.949059 systemd-logind[1434]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:10:24.949865 systemd-logind[1434]: Removed session 5. Dec 13 14:10:25.020149 systemd[1]: Started sshd@3-10.200.20.31:22-10.200.16.10:43672.service. Dec 13 14:10:25.441076 sshd[1785]: Accepted publickey for core from 10.200.16.10 port 43672 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:25.442551 sshd[1785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:25.446572 systemd[1]: Started session-6.scope. Dec 13 14:10:25.446867 systemd-logind[1434]: New session 6 of user core. Dec 13 14:10:25.764353 sshd[1785]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:25.766392 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:10:25.766960 systemd-logind[1434]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:10:25.767095 systemd[1]: sshd@3-10.200.20.31:22-10.200.16.10:43672.service: Deactivated successfully. Dec 13 14:10:25.768021 systemd-logind[1434]: Removed session 6. Dec 13 14:10:25.834755 systemd[1]: Started sshd@4-10.200.20.31:22-10.200.16.10:43686.service. Dec 13 14:10:26.261602 sshd[1791]: Accepted publickey for core from 10.200.16.10 port 43686 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:26.263162 sshd[1791]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:26.266820 systemd-logind[1434]: New session 7 of user core. Dec 13 14:10:26.267281 systemd[1]: Started session-7.scope. Dec 13 14:10:26.752374 sudo[1794]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:10:26.752590 sudo[1794]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:10:26.808349 dbus-daemon[1424]: avc: received setenforce notice (enforcing=1) Dec 13 14:10:26.810075 sudo[1794]: pam_unix(sudo:session): session closed for user root Dec 13 14:10:26.908693 sshd[1791]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:26.911341 systemd[1]: sshd@4-10.200.20.31:22-10.200.16.10:43686.service: Deactivated successfully. Dec 13 14:10:26.912096 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:10:26.912699 systemd-logind[1434]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:10:26.913770 systemd-logind[1434]: Removed session 7. Dec 13 14:10:26.975914 systemd[1]: Started sshd@5-10.200.20.31:22-10.200.16.10:43702.service. Dec 13 14:10:27.384148 sshd[1801]: Accepted publickey for core from 10.200.16.10 port 43702 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:27.385463 sshd[1801]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:27.389171 systemd-logind[1434]: New session 8 of user core. Dec 13 14:10:27.389711 systemd[1]: Started session-8.scope. Dec 13 14:10:27.617993 sudo[1805]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:10:27.618239 sudo[1805]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:10:27.620789 sudo[1805]: pam_unix(sudo:session): session closed for user root Dec 13 14:10:27.625071 sudo[1804]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:10:27.625558 sudo[1804]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:10:27.633660 systemd[1]: Stopping audit-rules.service... Dec 13 14:10:27.633000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:10:27.639041 kernel: kauditd_printk_skb: 137 callbacks suppressed Dec 13 14:10:27.639097 kernel: audit: type=1305 audit(1734099027.633:219): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:10:27.647389 auditctl[1808]: No rules Dec 13 14:10:27.633000 audit[1808]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd6ba5550 a2=420 a3=0 items=0 ppid=1 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:27.674348 kernel: audit: type=1300 audit(1734099027.633:219): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd6ba5550 a2=420 a3=0 items=0 ppid=1 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:27.673080 sudo[1804]: pam_unix(sudo:session): session closed for user root Dec 13 14:10:27.650015 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:10:27.650224 systemd[1]: Stopped audit-rules.service. Dec 13 14:10:27.674675 augenrules[1825]: No rules Dec 13 14:10:27.651810 systemd[1]: Starting audit-rules.service... Dec 13 14:10:27.671706 systemd[1]: Finished audit-rules.service. Dec 13 14:10:27.633000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:10:27.681648 kernel: audit: type=1327 audit(1734099027.633:219): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:10:27.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.698156 kernel: audit: type=1131 audit(1734099027.649:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.713949 kernel: audit: type=1130 audit(1734099027.670:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.714022 kernel: audit: type=1106 audit(1734099027.671:222): pid=1804 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.671000 audit[1804]: USER_END pid=1804 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.672000 audit[1804]: CRED_DISP pid=1804 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.744558 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:10:27.744723 systemd[1]: Stopped kubelet.service. Dec 13 14:10:27.748583 kernel: audit: type=1104 audit(1734099027.672:223): pid=1804 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.748657 kernel: audit: type=1130 audit(1734099027.743:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.746674 systemd[1]: Starting kubelet.service... Dec 13 14:10:27.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.766390 sshd[1801]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:27.768917 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:10:27.769542 systemd[1]: sshd@5-10.200.20.31:22-10.200.16.10:43702.service: Deactivated successfully. Dec 13 14:10:27.771269 systemd-logind[1434]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:10:27.772164 systemd-logind[1434]: Removed session 8. Dec 13 14:10:27.780867 kernel: audit: type=1131 audit(1734099027.743:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.780977 kernel: audit: type=1106 audit(1734099027.766:226): pid=1801 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.766000 audit[1801]: USER_END pid=1801 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.766000 audit[1801]: CRED_DISP pid=1801 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.31:22-10.200.16.10:43702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.834827 systemd[1]: Started kubelet.service. Dec 13 14:10:27.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.31:22-10.200.16.10:43712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.840296 systemd[1]: Started sshd@6-10.200.20.31:22-10.200.16.10:43712.service. Dec 13 14:10:27.885916 kubelet[1834]: E1213 14:10:27.885873 1834 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:10:27.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:10:27.888271 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:10:27.888392 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:10:28.267000 audit[1841]: USER_ACCT pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:28.269166 sshd[1841]: Accepted publickey for core from 10.200.16.10 port 43712 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:28.268000 audit[1841]: CRED_ACQ pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:28.268000 audit[1841]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffece2f580 a2=3 a3=1 items=0 ppid=1 pid=1841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:28.268000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:28.270377 sshd[1841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:28.273984 systemd-logind[1434]: New session 9 of user core. Dec 13 14:10:28.274397 systemd[1]: Started session-9.scope. Dec 13 14:10:28.277000 audit[1841]: USER_START pid=1841 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:28.278000 audit[1843]: CRED_ACQ pid=1843 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:28.511000 audit[1844]: USER_ACCT pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:10:28.513029 sudo[1844]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:10:28.511000 audit[1844]: CRED_REFR pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:10:28.513263 sudo[1844]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:10:28.513000 audit[1844]: USER_START pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:10:28.524699 systemd[1]: Starting coreos-metadata.service... Dec 13 14:10:28.603628 coreos-metadata[1848]: Dec 13 14:10:28.603 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:10:28.606920 coreos-metadata[1848]: Dec 13 14:10:28.606 INFO Fetch successful Dec 13 14:10:28.607105 coreos-metadata[1848]: Dec 13 14:10:28.607 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Dec 13 14:10:28.608973 coreos-metadata[1848]: Dec 13 14:10:28.608 INFO Fetch successful Dec 13 14:10:28.609333 coreos-metadata[1848]: Dec 13 14:10:28.609 INFO Fetching http://168.63.129.16/machine/2a212396-b5dc-4b4e-81b4-1e95254b5c90/dd932467%2D00a5%2D4c6c%2D885c%2Db469ac326b63.%5Fci%2D3510.3.6%2Da%2D9396bf5055?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Dec 13 14:10:28.611349 coreos-metadata[1848]: Dec 13 14:10:28.611 INFO Fetch successful Dec 13 14:10:28.645067 coreos-metadata[1848]: Dec 13 14:10:28.644 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:10:28.657021 coreos-metadata[1848]: Dec 13 14:10:28.656 INFO Fetch successful Dec 13 14:10:28.665252 systemd[1]: Finished coreos-metadata.service. Dec 13 14:10:28.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:32.505961 systemd[1]: Stopped kubelet.service. Dec 13 14:10:32.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:32.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:32.508281 systemd[1]: Starting kubelet.service... Dec 13 14:10:32.527582 systemd[1]: Reloading. Dec 13 14:10:32.609897 /usr/lib/systemd/system-generators/torcx-generator[1909]: time="2024-12-13T14:10:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:10:32.610360 /usr/lib/systemd/system-generators/torcx-generator[1909]: time="2024-12-13T14:10:32Z" level=info msg="torcx already run" Dec 13 14:10:32.682344 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:10:32.682476 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:10:32.697859 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:10:32.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.775586 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:10:32.775676 kernel: audit: type=1400 audit(1734099032.768:243): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.806895 kernel: audit: type=1400 audit(1734099032.774:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.807001 kernel: audit: type=1400 audit(1734099032.774:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.836255 kernel: audit: type=1400 audit(1734099032.774:246): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.836351 kernel: audit: type=1400 audit(1734099032.774:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.873998 kernel: audit: type=1400 audit(1734099032.774:248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.913554 kernel: audit: type=1400 audit(1734099032.774:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.913641 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:10:32.913670 kernel: audit: type=1400 audit(1734099032.774:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.913686 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:10:32.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.790000 audit: BPF prog-id=47 op=LOAD Dec 13 14:10:32.790000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:10:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.805000 audit: BPF prog-id=48 op=LOAD Dec 13 14:10:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit: BPF prog-id=49 op=LOAD Dec 13 14:10:32.820000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:10:32.820000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.835000 audit: BPF prog-id=50 op=LOAD Dec 13 14:10:32.835000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:10:32.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.851000 audit: BPF prog-id=51 op=LOAD Dec 13 14:10:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.872000 audit: BPF prog-id=52 op=LOAD Dec 13 14:10:32.872000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:10:32.872000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:10:32.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.918000 audit: BPF prog-id=53 op=LOAD Dec 13 14:10:32.918000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:10:32.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit: BPF prog-id=54 op=LOAD Dec 13 14:10:32.921000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit: BPF prog-id=55 op=LOAD Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.921000 audit: BPF prog-id=56 op=LOAD Dec 13 14:10:32.921000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:10:32.921000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:10:32.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit: BPF prog-id=57 op=LOAD Dec 13 14:10:32.923000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.923000 audit: BPF prog-id=58 op=LOAD Dec 13 14:10:32.923000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit: BPF prog-id=59 op=LOAD Dec 13 14:10:32.924000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit: BPF prog-id=60 op=LOAD Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:32.924000 audit: BPF prog-id=61 op=LOAD Dec 13 14:10:32.924000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:10:32.924000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:10:32.961114 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:10:32.961242 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:10:32.961608 systemd[1]: Stopped kubelet.service. Dec 13 14:10:32.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:10:32.964263 systemd[1]: Starting kubelet.service... Dec 13 14:10:33.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:33.143598 systemd[1]: Started kubelet.service. Dec 13 14:10:33.182118 kubelet[1972]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:10:33.182118 kubelet[1972]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:10:33.182118 kubelet[1972]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:10:33.182468 kubelet[1972]: I1213 14:10:33.182203 1972 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:10:33.823246 kubelet[1972]: I1213 14:10:33.823210 1972 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:10:33.823246 kubelet[1972]: I1213 14:10:33.823239 1972 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:10:33.823579 kubelet[1972]: I1213 14:10:33.823559 1972 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:10:33.842632 kubelet[1972]: I1213 14:10:33.842596 1972 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:10:33.850678 kubelet[1972]: I1213 14:10:33.850651 1972 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:10:33.851073 kubelet[1972]: I1213 14:10:33.851056 1972 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:10:33.851376 kubelet[1972]: I1213 14:10:33.851358 1972 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:10:33.851532 kubelet[1972]: I1213 14:10:33.851519 1972 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:10:33.851594 kubelet[1972]: I1213 14:10:33.851585 1972 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:10:33.853059 kubelet[1972]: I1213 14:10:33.853035 1972 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:10:33.862286 kubelet[1972]: I1213 14:10:33.862255 1972 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:10:33.862429 kubelet[1972]: I1213 14:10:33.862418 1972 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:10:33.863306 kubelet[1972]: I1213 14:10:33.863286 1972 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:10:33.863423 kubelet[1972]: E1213 14:10:33.863395 1972 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:33.863423 kubelet[1972]: I1213 14:10:33.863397 1972 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:10:33.863552 kubelet[1972]: E1213 14:10:33.863538 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:33.864136 kubelet[1972]: I1213 14:10:33.864086 1972 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:10:33.864430 kubelet[1972]: I1213 14:10:33.864404 1972 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:10:33.865163 kubelet[1972]: W1213 14:10:33.865113 1972 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:10:33.865699 kubelet[1972]: I1213 14:10:33.865679 1972 server.go:1256] "Started kubelet" Dec 13 14:10:33.866044 kubelet[1972]: I1213 14:10:33.866021 1972 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:10:33.866795 kubelet[1972]: I1213 14:10:33.866772 1972 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:10:33.869878 kubelet[1972]: I1213 14:10:33.869849 1972 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:10:33.870167 kubelet[1972]: I1213 14:10:33.870117 1972 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:10:33.871000 audit[1972]: AVC avc: denied { mac_admin } for pid=1972 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:33.871000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:10:33.871000 audit[1972]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b94090 a1=4000b92240 a2=4000b94060 a3=25 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.871000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:10:33.873105 kubelet[1972]: I1213 14:10:33.873088 1972 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:10:33.872000 audit[1972]: AVC avc: denied { mac_admin } for pid=1972 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:33.872000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:10:33.872000 audit[1972]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009e9120 a1=4000b92258 a2=4000b94120 a3=25 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.872000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:10:33.873831 kubelet[1972]: I1213 14:10:33.873817 1972 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:10:33.874621 kubelet[1972]: I1213 14:10:33.874603 1972 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:10:33.877423 kubelet[1972]: I1213 14:10:33.877194 1972 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:10:33.877423 kubelet[1972]: I1213 14:10:33.877382 1972 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:10:33.877526 kubelet[1972]: I1213 14:10:33.877444 1972 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:10:33.877782 kubelet[1972]: E1213 14:10:33.877749 1972 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:10:33.879000 audit[1984]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:33.879000 audit[1984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc92d3860 a2=0 a3=1 items=0 ppid=1972 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:10:33.881081 kubelet[1972]: E1213 14:10:33.881043 1972 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.31.1810c1e236e92c61 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.31,UID:10.200.20.31,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.20.31,},FirstTimestamp:2024-12-13 14:10:33.865661537 +0000 UTC m=+0.718713715,LastTimestamp:2024-12-13 14:10:33.865661537 +0000 UTC m=+0.718713715,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.31,}" Dec 13 14:10:33.881374 kubelet[1972]: W1213 14:10:33.881319 1972 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.200.20.31" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:10:33.881374 kubelet[1972]: E1213 14:10:33.881348 1972 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.31" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:10:33.881707 kubelet[1972]: W1213 14:10:33.881680 1972 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:10:33.881707 kubelet[1972]: E1213 14:10:33.881703 1972 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:10:33.881000 audit[1985]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:33.881000 audit[1985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffe44280b0 a2=0 a3=1 items=0 ppid=1972 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:10:33.882521 kubelet[1972]: W1213 14:10:33.882491 1972 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:10:33.882521 kubelet[1972]: E1213 14:10:33.882519 1972 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:10:33.882976 kubelet[1972]: E1213 14:10:33.882930 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:33.883641 kubelet[1972]: I1213 14:10:33.883611 1972 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:10:33.884861 kubelet[1972]: I1213 14:10:33.884834 1972 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:10:33.884861 kubelet[1972]: I1213 14:10:33.884851 1972 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:10:33.884000 audit[1987]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:33.884000 audit[1987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe4038d60 a2=0 a3=1 items=0 ppid=1972 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:10:33.901090 kubelet[1972]: I1213 14:10:33.901061 1972 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:10:33.901090 kubelet[1972]: I1213 14:10:33.901082 1972 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:10:33.901090 kubelet[1972]: I1213 14:10:33.901097 1972 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:10:33.900000 audit[1989]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:33.900000 audit[1989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd6244d00 a2=0 a3=1 items=0 ppid=1972 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:10:33.905594 kubelet[1972]: I1213 14:10:33.905566 1972 policy_none.go:49] "None policy: Start" Dec 13 14:10:33.908380 kubelet[1972]: E1213 14:10:33.908355 1972 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.31\" not found" node="10.200.20.31" Dec 13 14:10:33.908467 kubelet[1972]: I1213 14:10:33.908432 1972 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:10:33.908467 kubelet[1972]: I1213 14:10:33.908459 1972 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:10:33.917688 systemd[1]: Created slice kubepods.slice. Dec 13 14:10:33.922095 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:10:33.925036 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:10:33.934064 kubelet[1972]: I1213 14:10:33.933987 1972 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:10:33.932000 audit[1972]: AVC avc: denied { mac_admin } for pid=1972 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:33.932000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:10:33.932000 audit[1972]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ed7aa0 a1=4000efbf20 a2=4000ed7a70 a3=25 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.932000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:10:33.934326 kubelet[1972]: I1213 14:10:33.934156 1972 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:10:33.934767 kubelet[1972]: I1213 14:10:33.934610 1972 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:10:33.936656 kubelet[1972]: E1213 14:10:33.936629 1972 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.31\" not found" Dec 13 14:10:33.975000 audit[1995]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:33.975000 audit[1995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff2b5ae10 a2=0 a3=1 items=0 ppid=1972 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:10:33.977180 kubelet[1972]: I1213 14:10:33.977157 1972 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:10:33.976000 audit[1996]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:33.976000 audit[1996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc3d5b6f0 a2=0 a3=1 items=0 ppid=1972 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:10:33.977000 audit[1997]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:33.977000 audit[1997]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdba339f0 a2=0 a3=1 items=0 ppid=1972 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:10:33.978883 kubelet[1972]: I1213 14:10:33.978868 1972 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:10:33.978979 kubelet[1972]: I1213 14:10:33.978970 1972 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:10:33.979203 kubelet[1972]: I1213 14:10:33.979189 1972 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:10:33.979360 kubelet[1972]: E1213 14:10:33.979349 1972 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:10:33.978000 audit[1998]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:33.978000 audit[1998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe027c400 a2=0 a3=1 items=0 ppid=1972 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:10:33.980000 audit[2000]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:33.980000 audit[2000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd79cde20 a2=0 a3=1 items=0 ppid=1972 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:10:33.980000 audit[1999]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:33.980000 audit[1999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd50abef0 a2=0 a3=1 items=0 ppid=1972 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:10:33.982000 audit[2001]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=2001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:33.982000 audit[2001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdabb9de0 a2=0 a3=1 items=0 ppid=1972 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.982000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:10:33.983963 kubelet[1972]: I1213 14:10:33.983946 1972 kubelet_node_status.go:73] "Attempting to register node" node="10.200.20.31" Dec 13 14:10:33.983000 audit[2002]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=2002 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:33.983000 audit[2002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc03a1140 a2=0 a3=1 items=0 ppid=1972 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:10:33.989783 kubelet[1972]: I1213 14:10:33.989761 1972 kubelet_node_status.go:76] "Successfully registered node" node="10.200.20.31" Dec 13 14:10:34.015102 kubelet[1972]: E1213 14:10:34.015074 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:34.116337 kubelet[1972]: E1213 14:10:34.116231 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:34.216898 kubelet[1972]: E1213 14:10:34.216865 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:34.317641 kubelet[1972]: E1213 14:10:34.317601 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:34.418271 kubelet[1972]: E1213 14:10:34.418187 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:34.518600 kubelet[1972]: E1213 14:10:34.518569 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:34.619015 kubelet[1972]: E1213 14:10:34.618992 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:34.668000 audit[1844]: USER_END pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:10:34.669458 sudo[1844]: pam_unix(sudo:session): session closed for user root Dec 13 14:10:34.668000 audit[1844]: CRED_DISP pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:10:34.719918 kubelet[1972]: E1213 14:10:34.719886 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:34.752241 sshd[1841]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:34.752000 audit[1841]: USER_END pid=1841 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.752000 audit[1841]: CRED_DISP pid=1841 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.755163 systemd-logind[1434]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:10:34.755165 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:10:34.755776 systemd[1]: sshd@6-10.200.20.31:22-10.200.16.10:43712.service: Deactivated successfully. Dec 13 14:10:34.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.31:22-10.200.16.10:43712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:34.756789 systemd-logind[1434]: Removed session 9. Dec 13 14:10:34.820332 kubelet[1972]: E1213 14:10:34.820303 1972 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.31\" not found" Dec 13 14:10:34.830508 kubelet[1972]: I1213 14:10:34.830488 1972 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:10:34.830683 kubelet[1972]: W1213 14:10:34.830663 1972 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:10:34.830773 kubelet[1972]: W1213 14:10:34.830760 1972 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:10:34.863811 kubelet[1972]: E1213 14:10:34.863788 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:34.921701 kubelet[1972]: I1213 14:10:34.921605 1972 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:10:34.922149 env[1449]: time="2024-12-13T14:10:34.922076649Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:10:34.922408 kubelet[1972]: I1213 14:10:34.922268 1972 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:10:35.864198 kubelet[1972]: E1213 14:10:35.864165 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:35.864496 kubelet[1972]: I1213 14:10:35.864225 1972 apiserver.go:52] "Watching apiserver" Dec 13 14:10:35.867887 kubelet[1972]: I1213 14:10:35.867864 1972 topology_manager.go:215] "Topology Admit Handler" podUID="764a7370-a0e6-4029-ad3b-e632cff4d05e" podNamespace="calico-system" podName="csi-node-driver-89tn6" Dec 13 14:10:35.868047 kubelet[1972]: I1213 14:10:35.868034 1972 topology_manager.go:215] "Topology Admit Handler" podUID="dd6f73a8-7e22-4c7f-8809-8bb93381e9f4" podNamespace="kube-system" podName="kube-proxy-ppjf5" Dec 13 14:10:35.868222 kubelet[1972]: E1213 14:10:35.868193 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-89tn6" podUID="764a7370-a0e6-4029-ad3b-e632cff4d05e" Dec 13 14:10:35.868270 kubelet[1972]: I1213 14:10:35.868200 1972 topology_manager.go:215] "Topology Admit Handler" podUID="36896fd4-3f82-4294-9def-8d6655ba2119" podNamespace="calico-system" podName="calico-node-cpb74" Dec 13 14:10:35.872979 systemd[1]: Created slice kubepods-besteffort-pod36896fd4_3f82_4294_9def_8d6655ba2119.slice. Dec 13 14:10:35.877857 kubelet[1972]: I1213 14:10:35.877836 1972 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:10:35.883662 systemd[1]: Created slice kubepods-besteffort-poddd6f73a8_7e22_4c7f_8809_8bb93381e9f4.slice. Dec 13 14:10:35.886271 kubelet[1972]: I1213 14:10:35.886240 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dd6f73a8-7e22-4c7f-8809-8bb93381e9f4-xtables-lock\") pod \"kube-proxy-ppjf5\" (UID: \"dd6f73a8-7e22-4c7f-8809-8bb93381e9f4\") " pod="kube-system/kube-proxy-ppjf5" Dec 13 14:10:35.886371 kubelet[1972]: I1213 14:10:35.886290 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dd6f73a8-7e22-4c7f-8809-8bb93381e9f4-lib-modules\") pod \"kube-proxy-ppjf5\" (UID: \"dd6f73a8-7e22-4c7f-8809-8bb93381e9f4\") " pod="kube-system/kube-proxy-ppjf5" Dec 13 14:10:35.886371 kubelet[1972]: I1213 14:10:35.886312 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/36896fd4-3f82-4294-9def-8d6655ba2119-xtables-lock\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.886371 kubelet[1972]: I1213 14:10:35.886333 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/36896fd4-3f82-4294-9def-8d6655ba2119-policysync\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.886371 kubelet[1972]: I1213 14:10:35.886353 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/36896fd4-3f82-4294-9def-8d6655ba2119-cni-bin-dir\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.886472 kubelet[1972]: I1213 14:10:35.886383 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/36896fd4-3f82-4294-9def-8d6655ba2119-cni-net-dir\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.886472 kubelet[1972]: I1213 14:10:35.886404 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/36896fd4-3f82-4294-9def-8d6655ba2119-flexvol-driver-host\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.886687 kubelet[1972]: I1213 14:10:35.886633 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/764a7370-a0e6-4029-ad3b-e632cff4d05e-kubelet-dir\") pod \"csi-node-driver-89tn6\" (UID: \"764a7370-a0e6-4029-ad3b-e632cff4d05e\") " pod="calico-system/csi-node-driver-89tn6" Dec 13 14:10:35.886737 kubelet[1972]: I1213 14:10:35.886719 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-98mcc\" (UniqueName: \"kubernetes.io/projected/764a7370-a0e6-4029-ad3b-e632cff4d05e-kube-api-access-98mcc\") pod \"csi-node-driver-89tn6\" (UID: \"764a7370-a0e6-4029-ad3b-e632cff4d05e\") " pod="calico-system/csi-node-driver-89tn6" Dec 13 14:10:35.886765 kubelet[1972]: I1213 14:10:35.886750 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/dd6f73a8-7e22-4c7f-8809-8bb93381e9f4-kube-proxy\") pod \"kube-proxy-ppjf5\" (UID: \"dd6f73a8-7e22-4c7f-8809-8bb93381e9f4\") " pod="kube-system/kube-proxy-ppjf5" Dec 13 14:10:35.886789 kubelet[1972]: I1213 14:10:35.886774 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/36896fd4-3f82-4294-9def-8d6655ba2119-lib-modules\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.886829 kubelet[1972]: I1213 14:10:35.886814 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/36896fd4-3f82-4294-9def-8d6655ba2119-tigera-ca-bundle\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.886968 kubelet[1972]: I1213 14:10:35.886844 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/36896fd4-3f82-4294-9def-8d6655ba2119-var-lib-calico\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.887071 kubelet[1972]: I1213 14:10:35.887054 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/36896fd4-3f82-4294-9def-8d6655ba2119-cni-log-dir\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.887259 kubelet[1972]: I1213 14:10:35.887244 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nkpdv\" (UniqueName: \"kubernetes.io/projected/dd6f73a8-7e22-4c7f-8809-8bb93381e9f4-kube-api-access-nkpdv\") pod \"kube-proxy-ppjf5\" (UID: \"dd6f73a8-7e22-4c7f-8809-8bb93381e9f4\") " pod="kube-system/kube-proxy-ppjf5" Dec 13 14:10:35.887364 kubelet[1972]: I1213 14:10:35.887352 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/36896fd4-3f82-4294-9def-8d6655ba2119-node-certs\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.887597 kubelet[1972]: I1213 14:10:35.887580 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/36896fd4-3f82-4294-9def-8d6655ba2119-var-run-calico\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.887741 kubelet[1972]: I1213 14:10:35.887719 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/764a7370-a0e6-4029-ad3b-e632cff4d05e-varrun\") pod \"csi-node-driver-89tn6\" (UID: \"764a7370-a0e6-4029-ad3b-e632cff4d05e\") " pod="calico-system/csi-node-driver-89tn6" Dec 13 14:10:35.887825 kubelet[1972]: I1213 14:10:35.887808 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/764a7370-a0e6-4029-ad3b-e632cff4d05e-socket-dir\") pod \"csi-node-driver-89tn6\" (UID: \"764a7370-a0e6-4029-ad3b-e632cff4d05e\") " pod="calico-system/csi-node-driver-89tn6" Dec 13 14:10:35.887868 kubelet[1972]: I1213 14:10:35.887852 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/764a7370-a0e6-4029-ad3b-e632cff4d05e-registration-dir\") pod \"csi-node-driver-89tn6\" (UID: \"764a7370-a0e6-4029-ad3b-e632cff4d05e\") " pod="calico-system/csi-node-driver-89tn6" Dec 13 14:10:35.888006 kubelet[1972]: I1213 14:10:35.887991 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l8k8q\" (UniqueName: \"kubernetes.io/projected/36896fd4-3f82-4294-9def-8d6655ba2119-kube-api-access-l8k8q\") pod \"calico-node-cpb74\" (UID: \"36896fd4-3f82-4294-9def-8d6655ba2119\") " pod="calico-system/calico-node-cpb74" Dec 13 14:10:35.990252 kubelet[1972]: E1213 14:10:35.990226 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:10:35.990424 kubelet[1972]: W1213 14:10:35.990406 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:10:35.990496 kubelet[1972]: E1213 14:10:35.990485 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:10:35.990683 kubelet[1972]: E1213 14:10:35.990658 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:10:35.990683 kubelet[1972]: W1213 14:10:35.990676 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:10:35.990761 kubelet[1972]: E1213 14:10:35.990702 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:10:35.990885 kubelet[1972]: E1213 14:10:35.990870 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:10:35.990885 kubelet[1972]: W1213 14:10:35.990883 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:10:35.990952 kubelet[1972]: E1213 14:10:35.990896 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:10:35.991041 kubelet[1972]: E1213 14:10:35.991027 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:10:35.991076 kubelet[1972]: W1213 14:10:35.991041 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:10:35.991076 kubelet[1972]: E1213 14:10:35.991052 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:10:35.991488 kubelet[1972]: E1213 14:10:35.991423 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:10:35.991488 kubelet[1972]: W1213 14:10:35.991439 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:10:35.991488 kubelet[1972]: E1213 14:10:35.991455 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:10:36.001073 kubelet[1972]: E1213 14:10:36.000304 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:10:36.001073 kubelet[1972]: W1213 14:10:36.000326 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:10:36.001073 kubelet[1972]: E1213 14:10:36.000345 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:10:36.005277 kubelet[1972]: E1213 14:10:36.005255 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:10:36.005397 kubelet[1972]: W1213 14:10:36.005383 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:10:36.005457 kubelet[1972]: E1213 14:10:36.005447 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:10:36.011301 kubelet[1972]: E1213 14:10:36.008805 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:10:36.011301 kubelet[1972]: W1213 14:10:36.008830 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:10:36.011301 kubelet[1972]: E1213 14:10:36.008846 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:10:36.011480 kubelet[1972]: E1213 14:10:36.011455 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:10:36.011480 kubelet[1972]: W1213 14:10:36.011474 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:10:36.011536 kubelet[1972]: E1213 14:10:36.011498 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:10:36.183166 env[1449]: time="2024-12-13T14:10:36.182192883Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cpb74,Uid:36896fd4-3f82-4294-9def-8d6655ba2119,Namespace:calico-system,Attempt:0,}" Dec 13 14:10:36.187039 env[1449]: time="2024-12-13T14:10:36.186885758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ppjf5,Uid:dd6f73a8-7e22-4c7f-8809-8bb93381e9f4,Namespace:kube-system,Attempt:0,}" Dec 13 14:10:36.864945 kubelet[1972]: E1213 14:10:36.864900 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:37.016972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount620725360.mount: Deactivated successfully. Dec 13 14:10:37.054365 env[1449]: time="2024-12-13T14:10:37.054312300Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:37.059243 env[1449]: time="2024-12-13T14:10:37.059199356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:37.065787 env[1449]: time="2024-12-13T14:10:37.065753285Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:37.071149 env[1449]: time="2024-12-13T14:10:37.071102154Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:37.075279 env[1449]: time="2024-12-13T14:10:37.075244525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:37.078273 env[1449]: time="2024-12-13T14:10:37.078246017Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:37.083165 env[1449]: time="2024-12-13T14:10:37.083115478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:37.089260 env[1449]: time="2024-12-13T14:10:37.089232265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:37.147669 env[1449]: time="2024-12-13T14:10:37.147059311Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:10:37.147669 env[1449]: time="2024-12-13T14:10:37.147105456Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:10:37.147843 env[1449]: time="2024-12-13T14:10:37.147116013Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:10:37.147904 env[1449]: time="2024-12-13T14:10:37.147867256Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9249d8dc2fe6683dbfbc7fc87c25844eee2ad29db9cc102949a850e1c7a7a13 pid=2031 runtime=io.containerd.runc.v2 Dec 13 14:10:37.151033 env[1449]: time="2024-12-13T14:10:37.149617063Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:10:37.151033 env[1449]: time="2024-12-13T14:10:37.149670726Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:10:37.151033 env[1449]: time="2024-12-13T14:10:37.149682602Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:10:37.151033 env[1449]: time="2024-12-13T14:10:37.149885538Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4c4cfce0976502ed1f1c47f12390bd5fd74ccec9ff6f3c5f08e4b7ca09255e32 pid=2039 runtime=io.containerd.runc.v2 Dec 13 14:10:37.164835 systemd[1]: Started cri-containerd-d9249d8dc2fe6683dbfbc7fc87c25844eee2ad29db9cc102949a850e1c7a7a13.scope. Dec 13 14:10:37.175826 systemd[1]: Started cri-containerd-4c4cfce0976502ed1f1c47f12390bd5fd74ccec9ff6f3c5f08e4b7ca09255e32.scope. Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.186000 audit: BPF prog-id=62 op=LOAD Dec 13 14:10:37.187000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.187000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2031 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323439643864633266653636383364626662633766633837633235 Dec 13 14:10:37.187000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.187000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2031 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323439643864633266653636383364626662633766633837633235 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit: BPF prog-id=63 op=LOAD Dec 13 14:10:37.188000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2031 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323439643864633266653636383364626662633766633837633235 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.188000 audit: BPF prog-id=64 op=LOAD Dec 13 14:10:37.188000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2031 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323439643864633266653636383364626662633766633837633235 Dec 13 14:10:37.189000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:10:37.189000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.189000 audit: BPF prog-id=65 op=LOAD Dec 13 14:10:37.189000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2031 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323439643864633266653636383364626662633766633837633235 Dec 13 14:10:37.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.194000 audit: BPF prog-id=66 op=LOAD Dec 13 14:10:37.194000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.194000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2039 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463346366636530393736353032656431663163343766313233393062 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2039 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463346366636530393736353032656431663163343766313233393062 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit: BPF prog-id=67 op=LOAD Dec 13 14:10:37.195000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2039 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463346366636530393736353032656431663163343766313233393062 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.195000 audit: BPF prog-id=68 op=LOAD Dec 13 14:10:37.195000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2039 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463346366636530393736353032656431663163343766313233393062 Dec 13 14:10:37.196000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:10:37.196000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:37.196000 audit: BPF prog-id=69 op=LOAD Dec 13 14:10:37.196000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2039 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:37.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463346366636530393736353032656431663163343766313233393062 Dec 13 14:10:37.210360 env[1449]: time="2024-12-13T14:10:37.210304964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cpb74,Uid:36896fd4-3f82-4294-9def-8d6655ba2119,Namespace:calico-system,Attempt:0,} returns sandbox id \"d9249d8dc2fe6683dbfbc7fc87c25844eee2ad29db9cc102949a850e1c7a7a13\"" Dec 13 14:10:37.214093 env[1449]: time="2024-12-13T14:10:37.214053860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:10:37.217273 env[1449]: time="2024-12-13T14:10:37.217243692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ppjf5,Uid:dd6f73a8-7e22-4c7f-8809-8bb93381e9f4,Namespace:kube-system,Attempt:0,} returns sandbox id \"4c4cfce0976502ed1f1c47f12390bd5fd74ccec9ff6f3c5f08e4b7ca09255e32\"" Dec 13 14:10:37.865990 kubelet[1972]: E1213 14:10:37.865955 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:37.981596 kubelet[1972]: E1213 14:10:37.980346 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-89tn6" podUID="764a7370-a0e6-4029-ad3b-e632cff4d05e" Dec 13 14:10:38.504056 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount262187087.mount: Deactivated successfully. Dec 13 14:10:38.650493 env[1449]: time="2024-12-13T14:10:38.650439045Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:38.656420 env[1449]: time="2024-12-13T14:10:38.656390816Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:38.660567 env[1449]: time="2024-12-13T14:10:38.660541500Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:38.665187 env[1449]: time="2024-12-13T14:10:38.665162640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:38.665836 env[1449]: time="2024-12-13T14:10:38.665811441Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:10:38.667585 env[1449]: time="2024-12-13T14:10:38.667557824Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:10:38.668764 env[1449]: time="2024-12-13T14:10:38.668730623Z" level=info msg="CreateContainer within sandbox \"d9249d8dc2fe6683dbfbc7fc87c25844eee2ad29db9cc102949a850e1c7a7a13\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:10:38.691456 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3341865851.mount: Deactivated successfully. Dec 13 14:10:38.707956 env[1449]: time="2024-12-13T14:10:38.707915741Z" level=info msg="CreateContainer within sandbox \"d9249d8dc2fe6683dbfbc7fc87c25844eee2ad29db9cc102949a850e1c7a7a13\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3254858eb2904ad1c5dbf54bacc7b7cdb310c8cf0e4ee854d5cf7427c0927ce3\"" Dec 13 14:10:38.708925 env[1449]: time="2024-12-13T14:10:38.708887042Z" level=info msg="StartContainer for \"3254858eb2904ad1c5dbf54bacc7b7cdb310c8cf0e4ee854d5cf7427c0927ce3\"" Dec 13 14:10:38.726541 systemd[1]: Started cri-containerd-3254858eb2904ad1c5dbf54bacc7b7cdb310c8cf0e4ee854d5cf7427c0927ce3.scope. Dec 13 14:10:38.743000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.749828 kernel: kauditd_printk_skb: 333 callbacks suppressed Dec 13 14:10:38.749923 kernel: audit: type=1400 audit(1734099038.743:472): avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.743000 audit[2112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2031 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:38.795312 kernel: audit: type=1300 audit(1734099038.743:472): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2031 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:38.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353438353865623239303461643163356462663534626163633762 Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.844446 kernel: audit: type=1327 audit(1734099038.743:472): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353438353865623239303461643163356462663534626163633762 Dec 13 14:10:38.844513 kernel: audit: type=1400 audit(1734099038.758:473): avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.864353 kernel: audit: type=1400 audit(1734099038.758:473): avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.883820 kernel: audit: type=1400 audit(1734099038.758:473): avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.883921 kubelet[1972]: E1213 14:10:38.867049 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:38.884204 env[1449]: time="2024-12-13T14:10:38.867887897Z" level=info msg="StartContainer for \"3254858eb2904ad1c5dbf54bacc7b7cdb310c8cf0e4ee854d5cf7427c0927ce3\" returns successfully" Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.904496 kernel: audit: type=1400 audit(1734099038.758:473): avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.885841 systemd[1]: cri-containerd-3254858eb2904ad1c5dbf54bacc7b7cdb310c8cf0e4ee854d5cf7427c0927ce3.scope: Deactivated successfully. Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.925360 kernel: audit: type=1400 audit(1734099038.758:473): avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.945535 kernel: audit: type=1400 audit(1734099038.758:473): avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.967257 kernel: audit: type=1400 audit(1734099038.758:473): avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.758000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.758000 audit: BPF prog-id=70 op=LOAD Dec 13 14:10:38.758000 audit[2112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2031 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:38.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353438353865623239303461643163356462663534626163633762 Dec 13 14:10:38.766000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.766000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.766000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.766000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.766000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.766000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.766000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.766000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.766000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.766000 audit: BPF prog-id=71 op=LOAD Dec 13 14:10:38.766000 audit[2112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2031 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:38.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353438353865623239303461643163356462663534626163633762 Dec 13 14:10:38.794000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:10:38.794000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:38.794000 audit: BPF prog-id=72 op=LOAD Dec 13 14:10:38.794000 audit[2112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2031 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:38.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353438353865623239303461643163356462663534626163633762 Dec 13 14:10:38.905000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:10:39.016409 env[1449]: time="2024-12-13T14:10:39.016368641Z" level=info msg="shim disconnected" id=3254858eb2904ad1c5dbf54bacc7b7cdb310c8cf0e4ee854d5cf7427c0927ce3 Dec 13 14:10:39.016623 env[1449]: time="2024-12-13T14:10:39.016606810Z" level=warning msg="cleaning up after shim disconnected" id=3254858eb2904ad1c5dbf54bacc7b7cdb310c8cf0e4ee854d5cf7427c0927ce3 namespace=k8s.io Dec 13 14:10:39.016705 env[1449]: time="2024-12-13T14:10:39.016692224Z" level=info msg="cleaning up dead shim" Dec 13 14:10:39.023781 env[1449]: time="2024-12-13T14:10:39.023739758Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:10:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2153 runtime=io.containerd.runc.v2\n" Dec 13 14:10:39.867408 kubelet[1972]: E1213 14:10:39.867343 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:39.981007 kubelet[1972]: E1213 14:10:39.980503 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-89tn6" podUID="764a7370-a0e6-4029-ad3b-e632cff4d05e" Dec 13 14:10:39.994585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3034646314.mount: Deactivated successfully. Dec 13 14:10:40.439075 env[1449]: time="2024-12-13T14:10:40.439024755Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:40.444940 env[1449]: time="2024-12-13T14:10:40.444895688Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:40.448999 env[1449]: time="2024-12-13T14:10:40.448973223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:40.453203 env[1449]: time="2024-12-13T14:10:40.453163484Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:40.453461 env[1449]: time="2024-12-13T14:10:40.453425928Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06\"" Dec 13 14:10:40.454700 env[1449]: time="2024-12-13T14:10:40.454656610Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:10:40.455953 env[1449]: time="2024-12-13T14:10:40.455922042Z" level=info msg="CreateContainer within sandbox \"4c4cfce0976502ed1f1c47f12390bd5fd74ccec9ff6f3c5f08e4b7ca09255e32\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:10:40.484252 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2465517956.mount: Deactivated successfully. Dec 13 14:10:40.498265 env[1449]: time="2024-12-13T14:10:40.498208867Z" level=info msg="CreateContainer within sandbox \"4c4cfce0976502ed1f1c47f12390bd5fd74ccec9ff6f3c5f08e4b7ca09255e32\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c9c9ce193c7f5f69d8d667b1f97a5903294f9ce9bec003b8097fca5719fdb608\"" Dec 13 14:10:40.499069 env[1449]: time="2024-12-13T14:10:40.499039905Z" level=info msg="StartContainer for \"c9c9ce193c7f5f69d8d667b1f97a5903294f9ce9bec003b8097fca5719fdb608\"" Dec 13 14:10:40.517356 systemd[1]: Started cri-containerd-c9c9ce193c7f5f69d8d667b1f97a5903294f9ce9bec003b8097fca5719fdb608.scope. Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2039 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339633963653139336337663566363964386436363762316639376135 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit: BPF prog-id=73 op=LOAD Dec 13 14:10:40.533000 audit[2174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2039 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339633963653139336337663566363964386436363762316639376135 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit: BPF prog-id=74 op=LOAD Dec 13 14:10:40.533000 audit[2174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2039 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339633963653139336337663566363964386436363762316639376135 Dec 13 14:10:40.533000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:10:40.533000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:40.533000 audit: BPF prog-id=75 op=LOAD Dec 13 14:10:40.533000 audit[2174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2039 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339633963653139336337663566363964386436363762316639376135 Dec 13 14:10:40.554350 env[1449]: time="2024-12-13T14:10:40.554287241Z" level=info msg="StartContainer for \"c9c9ce193c7f5f69d8d667b1f97a5903294f9ce9bec003b8097fca5719fdb608\" returns successfully" Dec 13 14:10:40.603000 audit[2226]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:40.603000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc41c0070 a2=0 a3=1 items=0 ppid=2185 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:10:40.605000 audit[2227]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.605000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffedf904f0 a2=0 a3=1 items=0 ppid=2185 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:10:40.607000 audit[2228]: NETFILTER_CFG table=nat:19 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:40.607000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9adeed0 a2=0 a3=1 items=0 ppid=2185 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:10:40.607000 audit[2229]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.607000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff9782f00 a2=0 a3=1 items=0 ppid=2185 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:10:40.608000 audit[2231]: NETFILTER_CFG table=filter:21 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:40.608000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb9b6620 a2=0 a3=1 items=0 ppid=2185 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:10:40.609000 audit[2232]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.609000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffedde05c0 a2=0 a3=1 items=0 ppid=2185 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:10:40.705000 audit[2233]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.705000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffc364b20 a2=0 a3=1 items=0 ppid=2185 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.705000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:10:40.707000 audit[2235]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.707000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd4d3ba70 a2=0 a3=1 items=0 ppid=2185 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:10:40.711000 audit[2238]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.711000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff27c5420 a2=0 a3=1 items=0 ppid=2185 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:10:40.713000 audit[2239]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.713000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4483790 a2=0 a3=1 items=0 ppid=2185 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:10:40.715000 audit[2241]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.715000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff198b6c0 a2=0 a3=1 items=0 ppid=2185 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.715000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:10:40.716000 audit[2242]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.716000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeecb4380 a2=0 a3=1 items=0 ppid=2185 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.716000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:10:40.719000 audit[2244]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.719000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe6e7bfe0 a2=0 a3=1 items=0 ppid=2185 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.719000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:10:40.722000 audit[2247]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.722000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc3bedbb0 a2=0 a3=1 items=0 ppid=2185 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.722000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:10:40.728000 audit[2248]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.728000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc39e9800 a2=0 a3=1 items=0 ppid=2185 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:10:40.731000 audit[2250]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.731000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff6737e90 a2=0 a3=1 items=0 ppid=2185 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:10:40.732000 audit[2251]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.732000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd7cdb7f0 a2=0 a3=1 items=0 ppid=2185 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:10:40.735000 audit[2253]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.735000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc1d49660 a2=0 a3=1 items=0 ppid=2185 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:10:40.738000 audit[2256]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.738000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3095c50 a2=0 a3=1 items=0 ppid=2185 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:10:40.743000 audit[2259]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.743000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffe4b47e0 a2=0 a3=1 items=0 ppid=2185 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:10:40.744000 audit[2260]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.744000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff550ce30 a2=0 a3=1 items=0 ppid=2185 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.744000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:10:40.746000 audit[2262]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.746000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe2802e00 a2=0 a3=1 items=0 ppid=2185 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:10:40.817000 audit[2267]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.817000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc8314670 a2=0 a3=1 items=0 ppid=2185 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:10:40.818000 audit[2268]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.818000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6deb850 a2=0 a3=1 items=0 ppid=2185 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:10:40.821000 audit[2270]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:10:40.821000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff24982c0 a2=0 a3=1 items=0 ppid=2185 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:10:40.849000 audit[2276]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:40.849000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd2114630 a2=0 a3=1 items=0 ppid=2185 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:40.867983 kubelet[1972]: E1213 14:10:40.867947 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:40.905000 audit[2276]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:40.905000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffd2114630 a2=0 a3=1 items=0 ppid=2185 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.905000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:41.008799 kubelet[1972]: I1213 14:10:41.008747 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-ppjf5" podStartSLOduration=3.773364099 podStartE2EDuration="7.008670381s" podCreationTimestamp="2024-12-13 14:10:34 +0000 UTC" firstStartedPulling="2024-12-13 14:10:37.218469224 +0000 UTC m=+4.071521402" lastFinishedPulling="2024-12-13 14:10:40.453775506 +0000 UTC m=+7.306827684" observedRunningTime="2024-12-13 14:10:41.008644389 +0000 UTC m=+7.861696527" watchObservedRunningTime="2024-12-13 14:10:41.008670381 +0000 UTC m=+7.861722559" Dec 13 14:10:41.137000 audit[2284]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.137000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe8c28820 a2=0 a3=1 items=0 ppid=2185 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:10:41.140000 audit[2286]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.140000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc1748260 a2=0 a3=1 items=0 ppid=2185 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:10:41.144000 audit[2289]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.144000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe2af7400 a2=0 a3=1 items=0 ppid=2185 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:10:41.146000 audit[2290]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.146000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc786b230 a2=0 a3=1 items=0 ppid=2185 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:10:41.149000 audit[2292]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.149000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc0a42730 a2=0 a3=1 items=0 ppid=2185 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:10:41.150000 audit[2293]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.150000 audit[2293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff69e200 a2=0 a3=1 items=0 ppid=2185 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:10:41.152000 audit[2295]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.152000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe4d72e90 a2=0 a3=1 items=0 ppid=2185 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:10:41.156000 audit[2298]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.156000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc33bb910 a2=0 a3=1 items=0 ppid=2185 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:10:41.157000 audit[2299]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.157000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc39e2190 a2=0 a3=1 items=0 ppid=2185 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:10:41.159000 audit[2301]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.159000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa6f3630 a2=0 a3=1 items=0 ppid=2185 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:10:41.161000 audit[2302]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.161000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde7ef800 a2=0 a3=1 items=0 ppid=2185 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:10:41.163000 audit[2304]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.163000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffde59a320 a2=0 a3=1 items=0 ppid=2185 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:10:41.167000 audit[2307]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.167000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe1f8bb30 a2=0 a3=1 items=0 ppid=2185 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:10:41.171000 audit[2310]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.171000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdea14f80 a2=0 a3=1 items=0 ppid=2185 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:10:41.172000 audit[2311]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.172000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe8a72ab0 a2=0 a3=1 items=0 ppid=2185 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:10:41.175000 audit[2313]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.175000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffed57bfb0 a2=0 a3=1 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:10:41.178000 audit[2316]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.178000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffea4f2940 a2=0 a3=1 items=0 ppid=2185 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:10:41.180000 audit[2317]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.180000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd834fa50 a2=0 a3=1 items=0 ppid=2185 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:10:41.182000 audit[2319]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.182000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff6085cb0 a2=0 a3=1 items=0 ppid=2185 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:10:41.183000 audit[2320]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.183000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcec4ae00 a2=0 a3=1 items=0 ppid=2185 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:10:41.186000 audit[2322]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.186000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffff9d5cd0 a2=0 a3=1 items=0 ppid=2185 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:10:41.189000 audit[2325]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:10:41.189000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc1fa1b80 a2=0 a3=1 items=0 ppid=2185 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:10:41.192000 audit[2327]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:10:41.192000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffc84909e0 a2=0 a3=1 items=0 ppid=2185 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.192000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:41.193000 audit[2327]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:10:41.193000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc84909e0 a2=0 a3=1 items=0 ppid=2185 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.193000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:41.868070 kubelet[1972]: E1213 14:10:41.868040 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:41.981150 kubelet[1972]: E1213 14:10:41.980470 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-89tn6" podUID="764a7370-a0e6-4029-ad3b-e632cff4d05e" Dec 13 14:10:42.868671 kubelet[1972]: E1213 14:10:42.868630 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:43.821795 env[1449]: time="2024-12-13T14:10:43.821751767Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:43.827879 env[1449]: time="2024-12-13T14:10:43.827839537Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:43.833873 env[1449]: time="2024-12-13T14:10:43.833835011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:43.837897 env[1449]: time="2024-12-13T14:10:43.837874129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:43.838521 env[1449]: time="2024-12-13T14:10:43.838495803Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:10:43.840805 env[1449]: time="2024-12-13T14:10:43.840779831Z" level=info msg="CreateContainer within sandbox \"d9249d8dc2fe6683dbfbc7fc87c25844eee2ad29db9cc102949a850e1c7a7a13\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:10:43.866045 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3691922366.mount: Deactivated successfully. Dec 13 14:10:43.869597 kubelet[1972]: E1213 14:10:43.869536 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:43.883616 env[1449]: time="2024-12-13T14:10:43.883558175Z" level=info msg="CreateContainer within sandbox \"d9249d8dc2fe6683dbfbc7fc87c25844eee2ad29db9cc102949a850e1c7a7a13\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5272f81d8c086d406d4b50c4a4d7030d887082cd40196a321fdf18b45d12bcaa\"" Dec 13 14:10:43.884596 env[1449]: time="2024-12-13T14:10:43.884565745Z" level=info msg="StartContainer for \"5272f81d8c086d406d4b50c4a4d7030d887082cd40196a321fdf18b45d12bcaa\"" Dec 13 14:10:43.911979 systemd[1]: run-containerd-runc-k8s.io-5272f81d8c086d406d4b50c4a4d7030d887082cd40196a321fdf18b45d12bcaa-runc.YWjVPi.mount: Deactivated successfully. Dec 13 14:10:43.913334 systemd[1]: Started cri-containerd-5272f81d8c086d406d4b50c4a4d7030d887082cd40196a321fdf18b45d12bcaa.scope. Dec 13 14:10:43.952716 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:10:43.952835 kernel: audit: type=1400 audit(1734099043.927:536): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2031 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:43.981688 kernel: audit: type=1300 audit(1734099043.927:536): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2031 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:43.982362 kubelet[1972]: E1213 14:10:43.982340 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-89tn6" podUID="764a7370-a0e6-4029-ad3b-e632cff4d05e" Dec 13 14:10:43.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532373266383164386330383664343036643462353063346134643730 Dec 13 14:10:44.007467 kernel: audit: type=1327 audit(1734099043.927:536): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532373266383164386330383664343036643462353063346134643730 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:44.025733 kernel: audit: type=1400 audit(1734099043.927:537): avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:44.026159 kernel: audit: type=1400 audit(1734099043.927:537): avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:44.061393 kernel: audit: type=1400 audit(1734099043.927:537): avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:44.079841 kernel: audit: type=1400 audit(1734099043.927:537): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:44.105398 kernel: audit: type=1400 audit(1734099043.927:537): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:44.124114 kernel: audit: type=1400 audit(1734099043.927:537): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:44.142514 kernel: audit: type=1400 audit(1734099043.927:537): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.927000 audit: BPF prog-id=76 op=LOAD Dec 13 14:10:43.927000 audit[2335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2031 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:43.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532373266383164386330383664343036643462353063346134643730 Dec 13 14:10:43.933000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.933000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.933000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.933000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.933000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.933000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.933000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.933000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.933000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.933000 audit: BPF prog-id=77 op=LOAD Dec 13 14:10:43.933000 audit[2335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2031 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:43.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532373266383164386330383664343036643462353063346134643730 Dec 13 14:10:43.952000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:10:43.952000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:43.952000 audit: BPF prog-id=78 op=LOAD Dec 13 14:10:43.952000 audit[2335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2031 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:43.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532373266383164386330383664343036643462353063346134643730 Dec 13 14:10:44.181434 env[1449]: time="2024-12-13T14:10:44.181388905Z" level=info msg="StartContainer for \"5272f81d8c086d406d4b50c4a4d7030d887082cd40196a321fdf18b45d12bcaa\" returns successfully" Dec 13 14:10:44.870516 kubelet[1972]: E1213 14:10:44.870476 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:45.225606 env[1449]: time="2024-12-13T14:10:45.225472419Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:10:45.227735 systemd[1]: cri-containerd-5272f81d8c086d406d4b50c4a4d7030d887082cd40196a321fdf18b45d12bcaa.scope: Deactivated successfully. Dec 13 14:10:45.230000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:10:45.245837 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5272f81d8c086d406d4b50c4a4d7030d887082cd40196a321fdf18b45d12bcaa-rootfs.mount: Deactivated successfully. Dec 13 14:10:45.317903 kubelet[1972]: I1213 14:10:45.317872 1972 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:10:45.871671 kubelet[1972]: E1213 14:10:45.871618 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:45.984297 systemd[1]: Created slice kubepods-besteffort-pod764a7370_a0e6_4029_ad3b_e632cff4d05e.slice. Dec 13 14:10:45.986502 env[1449]: time="2024-12-13T14:10:45.986469367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-89tn6,Uid:764a7370-a0e6-4029-ad3b-e632cff4d05e,Namespace:calico-system,Attempt:0,}" Dec 13 14:10:46.785113 env[1449]: time="2024-12-13T14:10:46.785067456Z" level=info msg="shim disconnected" id=5272f81d8c086d406d4b50c4a4d7030d887082cd40196a321fdf18b45d12bcaa Dec 13 14:10:46.785503 env[1449]: time="2024-12-13T14:10:46.785484194Z" level=warning msg="cleaning up after shim disconnected" id=5272f81d8c086d406d4b50c4a4d7030d887082cd40196a321fdf18b45d12bcaa namespace=k8s.io Dec 13 14:10:46.785564 env[1449]: time="2024-12-13T14:10:46.785551977Z" level=info msg="cleaning up dead shim" Dec 13 14:10:46.793101 env[1449]: time="2024-12-13T14:10:46.793066521Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:10:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2372 runtime=io.containerd.runc.v2\n" Dec 13 14:10:46.854830 env[1449]: time="2024-12-13T14:10:46.854743570Z" level=error msg="Failed to destroy network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:46.856349 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582-shm.mount: Deactivated successfully. Dec 13 14:10:46.857859 env[1449]: time="2024-12-13T14:10:46.857813572Z" level=error msg="encountered an error cleaning up failed sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:46.857995 env[1449]: time="2024-12-13T14:10:46.857969454Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-89tn6,Uid:764a7370-a0e6-4029-ad3b-e632cff4d05e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:46.858713 kubelet[1972]: E1213 14:10:46.858333 1972 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:46.858713 kubelet[1972]: E1213 14:10:46.858398 1972 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-89tn6" Dec 13 14:10:46.858713 kubelet[1972]: E1213 14:10:46.858420 1972 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-89tn6" Dec 13 14:10:46.858876 kubelet[1972]: E1213 14:10:46.858479 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-89tn6_calico-system(764a7370-a0e6-4029-ad3b-e632cff4d05e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-89tn6_calico-system(764a7370-a0e6-4029-ad3b-e632cff4d05e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-89tn6" podUID="764a7370-a0e6-4029-ad3b-e632cff4d05e" Dec 13 14:10:46.872614 kubelet[1972]: E1213 14:10:46.872549 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:47.012484 env[1449]: time="2024-12-13T14:10:47.012446099Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:10:47.012809 kubelet[1972]: I1213 14:10:47.012778 1972 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:10:47.013296 env[1449]: time="2024-12-13T14:10:47.013270261Z" level=info msg="StopPodSandbox for \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\"" Dec 13 14:10:47.040027 env[1449]: time="2024-12-13T14:10:47.039908216Z" level=error msg="StopPodSandbox for \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\" failed" error="failed to destroy network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:47.040861 kubelet[1972]: E1213 14:10:47.040834 1972 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:10:47.040984 kubelet[1972]: E1213 14:10:47.040919 1972 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582"} Dec 13 14:10:47.040984 kubelet[1972]: E1213 14:10:47.040964 1972 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"764a7370-a0e6-4029-ad3b-e632cff4d05e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:10:47.041098 kubelet[1972]: E1213 14:10:47.040993 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"764a7370-a0e6-4029-ad3b-e632cff4d05e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-89tn6" podUID="764a7370-a0e6-4029-ad3b-e632cff4d05e" Dec 13 14:10:47.873080 kubelet[1972]: E1213 14:10:47.873040 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:48.543149 kubelet[1972]: I1213 14:10:48.543023 1972 topology_manager.go:215] "Topology Admit Handler" podUID="5073e666-f20c-4374-a04e-64e2c950270f" podNamespace="default" podName="nginx-deployment-6d5f899847-5r9h7" Dec 13 14:10:48.547357 systemd[1]: Created slice kubepods-besteffort-pod5073e666_f20c_4374_a04e_64e2c950270f.slice. Dec 13 14:10:48.608049 kubelet[1972]: I1213 14:10:48.608013 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xcmwt\" (UniqueName: \"kubernetes.io/projected/5073e666-f20c-4374-a04e-64e2c950270f-kube-api-access-xcmwt\") pod \"nginx-deployment-6d5f899847-5r9h7\" (UID: \"5073e666-f20c-4374-a04e-64e2c950270f\") " pod="default/nginx-deployment-6d5f899847-5r9h7" Dec 13 14:10:48.851409 env[1449]: time="2024-12-13T14:10:48.851050623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-5r9h7,Uid:5073e666-f20c-4374-a04e-64e2c950270f,Namespace:default,Attempt:0,}" Dec 13 14:10:48.874162 kubelet[1972]: E1213 14:10:48.874116 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:49.255596 env[1449]: time="2024-12-13T14:10:49.255537519Z" level=error msg="Failed to destroy network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:49.257343 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356-shm.mount: Deactivated successfully. Dec 13 14:10:49.258434 env[1449]: time="2024-12-13T14:10:49.258394148Z" level=error msg="encountered an error cleaning up failed sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:49.258572 env[1449]: time="2024-12-13T14:10:49.258535356Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-5r9h7,Uid:5073e666-f20c-4374-a04e-64e2c950270f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:49.259748 kubelet[1972]: E1213 14:10:49.259705 1972 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:49.259846 kubelet[1972]: E1213 14:10:49.259775 1972 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-5r9h7" Dec 13 14:10:49.259846 kubelet[1972]: E1213 14:10:49.259795 1972 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-5r9h7" Dec 13 14:10:49.259846 kubelet[1972]: E1213 14:10:49.259843 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-5r9h7_default(5073e666-f20c-4374-a04e-64e2c950270f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-5r9h7_default(5073e666-f20c-4374-a04e-64e2c950270f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-5r9h7" podUID="5073e666-f20c-4374-a04e-64e2c950270f" Dec 13 14:10:49.875305 kubelet[1972]: E1213 14:10:49.875269 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:50.016908 kubelet[1972]: I1213 14:10:50.016882 1972 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:10:50.017684 env[1449]: time="2024-12-13T14:10:50.017637435Z" level=info msg="StopPodSandbox for \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\"" Dec 13 14:10:50.044556 env[1449]: time="2024-12-13T14:10:50.044490913Z" level=error msg="StopPodSandbox for \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\" failed" error="failed to destroy network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:10:50.044770 kubelet[1972]: E1213 14:10:50.044745 1972 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:10:50.044819 kubelet[1972]: E1213 14:10:50.044801 1972 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356"} Dec 13 14:10:50.044845 kubelet[1972]: E1213 14:10:50.044840 1972 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5073e666-f20c-4374-a04e-64e2c950270f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:10:50.044897 kubelet[1972]: E1213 14:10:50.044879 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5073e666-f20c-4374-a04e-64e2c950270f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-5r9h7" podUID="5073e666-f20c-4374-a04e-64e2c950270f" Dec 13 14:10:50.876037 kubelet[1972]: E1213 14:10:50.875997 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:51.876470 kubelet[1972]: E1213 14:10:51.876417 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:52.048881 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2747733544.mount: Deactivated successfully. Dec 13 14:10:52.152868 env[1449]: time="2024-12-13T14:10:52.152514974Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:52.174639 env[1449]: time="2024-12-13T14:10:52.174577445Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:52.178767 env[1449]: time="2024-12-13T14:10:52.178740808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:52.184884 env[1449]: time="2024-12-13T14:10:52.184852880Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:52.185212 env[1449]: time="2024-12-13T14:10:52.185180771Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:10:52.197079 env[1449]: time="2024-12-13T14:10:52.197038352Z" level=info msg="CreateContainer within sandbox \"d9249d8dc2fe6683dbfbc7fc87c25844eee2ad29db9cc102949a850e1c7a7a13\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:10:52.220619 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1696108451.mount: Deactivated successfully. Dec 13 14:10:52.236709 env[1449]: time="2024-12-13T14:10:52.236661402Z" level=info msg="CreateContainer within sandbox \"d9249d8dc2fe6683dbfbc7fc87c25844eee2ad29db9cc102949a850e1c7a7a13\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"770f47e6b6c23ab381014d71ce0da413b0ccde6f3330857d52860d26251076a4\"" Dec 13 14:10:52.237488 env[1449]: time="2024-12-13T14:10:52.237465353Z" level=info msg="StartContainer for \"770f47e6b6c23ab381014d71ce0da413b0ccde6f3330857d52860d26251076a4\"" Dec 13 14:10:52.252300 systemd[1]: Started cri-containerd-770f47e6b6c23ab381014d71ce0da413b0ccde6f3330857d52860d26251076a4.scope. Dec 13 14:10:52.267000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.274189 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:10:52.274264 kernel: audit: type=1400 audit(1734099052.267:543): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.291155 kernel: audit: type=1300 audit(1734099052.267:543): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2031 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:52.267000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2031 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:52.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306634376536623663323361623338313031346437316365306461 Dec 13 14:10:52.342443 kernel: audit: type=1327 audit(1734099052.267:543): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306634376536623663323361623338313031346437316365306461 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.360237 kernel: audit: type=1400 audit(1734099052.268:544): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.377312 kernel: audit: type=1400 audit(1734099052.268:544): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.394635 kernel: audit: type=1400 audit(1734099052.268:544): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.414752 kernel: audit: type=1400 audit(1734099052.268:544): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.433058 kernel: audit: type=1400 audit(1734099052.268:544): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.433155 kernel: audit: type=1400 audit(1734099052.268:544): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.450587 env[1449]: time="2024-12-13T14:10:52.450546130Z" level=info msg="StartContainer for \"770f47e6b6c23ab381014d71ce0da413b0ccde6f3330857d52860d26251076a4\" returns successfully" Dec 13 14:10:52.467676 kernel: audit: type=1400 audit(1734099052.268:544): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.268000 audit: BPF prog-id=79 op=LOAD Dec 13 14:10:52.268000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2031 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:52.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306634376536623663323361623338313031346437316365306461 Dec 13 14:10:52.273000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.273000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.273000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.273000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.273000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.273000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.273000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.273000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.273000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.273000 audit: BPF prog-id=80 op=LOAD Dec 13 14:10:52.273000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2031 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:52.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306634376536623663323361623338313031346437316365306461 Dec 13 14:10:52.290000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:10:52.290000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:52.290000 audit: BPF prog-id=81 op=LOAD Dec 13 14:10:52.290000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2031 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:52.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306634376536623663323361623338313031346437316365306461 Dec 13 14:10:52.678263 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:10:52.678412 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:10:52.876617 kubelet[1972]: E1213 14:10:52.876567 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:53.037861 kubelet[1972]: I1213 14:10:53.037817 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-cpb74" podStartSLOduration=4.064649462 podStartE2EDuration="19.037759732s" podCreationTimestamp="2024-12-13 14:10:34 +0000 UTC" firstStartedPulling="2024-12-13 14:10:37.212323487 +0000 UTC m=+4.065375665" lastFinishedPulling="2024-12-13 14:10:52.185433757 +0000 UTC m=+19.038485935" observedRunningTime="2024-12-13 14:10:53.037333419 +0000 UTC m=+19.890385597" watchObservedRunningTime="2024-12-13 14:10:53.037759732 +0000 UTC m=+19.890811910" Dec 13 14:10:53.863873 kubelet[1972]: E1213 14:10:53.863831 1972 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:53.876979 kubelet[1972]: E1213 14:10:53.876957 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:53.930000 audit[2640]: AVC avc: denied { write } for pid=2640 comm="tee" name="fd" dev="proc" ino=17835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:10:53.930000 audit[2640]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd2a7ca1e a2=241 a3=1b6 items=1 ppid=2588 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:53.930000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:10:53.930000 audit: PATH item=0 name="/dev/fd/63" inode=17828 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:53.930000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:10:53.934000 audit[2643]: AVC avc: denied { write } for pid=2643 comm="tee" name="fd" dev="proc" ino=18757 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:10:53.934000 audit[2643]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb661a1c a2=241 a3=1b6 items=1 ppid=2587 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:53.934000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:10:53.934000 audit: PATH item=0 name="/dev/fd/63" inode=17830 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:53.934000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:10:53.934000 audit[2645]: AVC avc: denied { write } for pid=2645 comm="tee" name="fd" dev="proc" ino=17840 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:10:53.934000 audit[2645]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3324a1c a2=241 a3=1b6 items=1 ppid=2583 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:53.934000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:10:53.934000 audit: PATH item=0 name="/dev/fd/63" inode=18750 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:53.934000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:10:53.938000 audit[2634]: AVC avc: denied { write } for pid=2634 comm="tee" name="fd" dev="proc" ino=18761 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:10:53.938000 audit[2634]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff879ca0c a2=241 a3=1b6 items=1 ppid=2584 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:53.938000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:10:53.938000 audit: PATH item=0 name="/dev/fd/63" inode=18747 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:53.940000 audit[2636]: AVC avc: denied { write } for pid=2636 comm="tee" name="fd" dev="proc" ino=18766 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:10:53.940000 audit[2636]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff8465a1d a2=241 a3=1b6 items=1 ppid=2593 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:53.940000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:10:53.940000 audit: PATH item=0 name="/dev/fd/63" inode=17829 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:53.940000 audit[2649]: AVC avc: denied { write } for pid=2649 comm="tee" name="fd" dev="proc" ino=17844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:10:53.940000 audit[2649]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3527a0d a2=241 a3=1b6 items=1 ppid=2591 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:53.940000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:10:53.940000 audit: PATH item=0 name="/dev/fd/63" inode=17837 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:53.940000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:10:53.938000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:10:53.940000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:10:53.953000 audit[2655]: AVC avc: denied { write } for pid=2655 comm="tee" name="fd" dev="proc" ino=17848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:10:53.953000 audit[2655]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff3d1aa1c a2=241 a3=1b6 items=1 ppid=2595 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:53.953000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:10:53.953000 audit: PATH item=0 name="/dev/fd/63" inode=18763 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:53.953000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:10:54.044528 systemd[1]: run-containerd-runc-k8s.io-770f47e6b6c23ab381014d71ce0da413b0ccde6f3330857d52860d26251076a4-runc.fZ5OZi.mount: Deactivated successfully. Dec 13 14:10:54.118000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.118000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.118000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.118000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.118000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.118000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.118000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.118000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.118000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.118000 audit: BPF prog-id=82 op=LOAD Dec 13 14:10:54.118000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdc105d98 a2=98 a3=ffffdc105d88 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.118000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.124000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:10:54.125000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.125000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.125000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.125000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.125000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.125000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.125000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.125000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.125000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.125000 audit: BPF prog-id=83 op=LOAD Dec 13 14:10:54.125000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc105a28 a2=74 a3=95 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.125000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.126000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:10:54.126000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.126000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.126000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.126000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.126000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.126000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.126000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.126000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.126000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.126000 audit: BPF prog-id=84 op=LOAD Dec 13 14:10:54.126000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc105a88 a2=94 a3=2 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.126000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.127000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit: BPF prog-id=85 op=LOAD Dec 13 14:10:54.224000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc105a48 a2=40 a3=ffffdc105a78 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.224000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.224000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:10:54.224000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.224000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdc105b60 a2=50 a3=0 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.224000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc105ab8 a2=28 a3=ffffdc105be8 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc105ae8 a2=28 a3=ffffdc105c18 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc105998 a2=28 a3=ffffdc105ac8 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc105b08 a2=28 a3=ffffdc105c38 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc105ae8 a2=28 a3=ffffdc105c18 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc105ad8 a2=28 a3=ffffdc105c08 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc105b08 a2=28 a3=ffffdc105c38 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc105ae8 a2=28 a3=ffffdc105c18 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc105b08 a2=28 a3=ffffdc105c38 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc105ad8 a2=28 a3=ffffdc105c08 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.232000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.232000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc105b58 a2=28 a3=ffffdc105c98 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.232000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc105890 a2=50 a3=0 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.233000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit: BPF prog-id=86 op=LOAD Dec 13 14:10:54.233000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdc105898 a2=94 a3=5 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.233000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.233000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc1059a0 a2=50 a3=0 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.233000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffdc105ae8 a2=4 a3=3 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.233000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { confidentiality } for pid=2707 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:54.233000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc105ac8 a2=94 a3=6 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.233000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { confidentiality } for pid=2707 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:54.233000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc105298 a2=94 a3=83 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.233000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.233000 audit[2707]: AVC avc: denied { confidentiality } for pid=2707 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:54.233000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc105298 a2=94 a3=83 items=0 ppid=2585 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.233000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit: BPF prog-id=87 op=LOAD Dec 13 14:10:54.240000 audit[2717]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa242bc8 a2=98 a3=fffffa242bb8 items=0 ppid=2585 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.240000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:10:54.240000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit: BPF prog-id=88 op=LOAD Dec 13 14:10:54.240000 audit[2717]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa242a78 a2=74 a3=95 items=0 ppid=2585 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.240000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:10:54.240000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.240000 audit: BPF prog-id=89 op=LOAD Dec 13 14:10:54.240000 audit[2717]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa242aa8 a2=40 a3=fffffa242ad8 items=0 ppid=2585 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.240000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:10:54.240000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:10:54.364587 systemd-networkd[1598]: vxlan.calico: Link UP Dec 13 14:10:54.364594 systemd-networkd[1598]: vxlan.calico: Gained carrier Dec 13 14:10:54.381000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.381000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.381000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.381000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.381000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.381000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.381000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.381000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.381000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.381000 audit: BPF prog-id=90 op=LOAD Dec 13 14:10:54.381000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdaef0a08 a2=98 a3=ffffdaef09f8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.381000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.381000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit: BPF prog-id=91 op=LOAD Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdaef06e8 a2=74 a3=95 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit: BPF prog-id=92 op=LOAD Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdaef0748 a2=94 a3=2 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdaef0778 a2=28 a3=ffffdaef08a8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdaef07a8 a2=28 a3=ffffdaef08d8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdaef0658 a2=28 a3=ffffdaef0788 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdaef07c8 a2=28 a3=ffffdaef08f8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdaef07a8 a2=28 a3=ffffdaef08d8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdaef0798 a2=28 a3=ffffdaef08c8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdaef07c8 a2=28 a3=ffffdaef08f8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdaef07a8 a2=28 a3=ffffdaef08d8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdaef07c8 a2=28 a3=ffffdaef08f8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdaef0798 a2=28 a3=ffffdaef08c8 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdaef0818 a2=28 a3=ffffdaef0958 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.382000 audit: BPF prog-id=93 op=LOAD Dec 13 14:10:54.382000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdaef0638 a2=40 a3=ffffdaef0668 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.382000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.382000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdaef0660 a2=50 a3=0 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.388000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdaef0660 a2=50 a3=0 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.388000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit: BPF prog-id=94 op=LOAD Dec 13 14:10:54.388000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdaeefdc8 a2=94 a3=2 items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.388000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.388000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.388000 audit: BPF prog-id=95 op=LOAD Dec 13 14:10:54.388000 audit[2744]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdaeeff58 a2=94 a3=2d items=0 ppid=2585 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.388000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:10:54.394000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.394000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.394000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.394000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.394000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.394000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.394000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.394000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.394000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.394000 audit: BPF prog-id=96 op=LOAD Dec 13 14:10:54.394000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0119828 a2=98 a3=ffffc0119818 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.394000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.395000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit: BPF prog-id=97 op=LOAD Dec 13 14:10:54.395000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc01194b8 a2=74 a3=95 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.395000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.395000 audit: BPF prog-id=98 op=LOAD Dec 13 14:10:54.395000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc0119518 a2=94 a3=2 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.395000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit: BPF prog-id=99 op=LOAD Dec 13 14:10:54.491000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc01194d8 a2=40 a3=ffffc0119508 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.491000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.491000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:10:54.491000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.491000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc01195f0 a2=50 a3=0 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.491000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0119548 a2=28 a3=ffffc0119678 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0119578 a2=28 a3=ffffc01196a8 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0119428 a2=28 a3=ffffc0119558 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0119598 a2=28 a3=ffffc01196c8 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0119578 a2=28 a3=ffffc01196a8 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0119568 a2=28 a3=ffffc0119698 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0119598 a2=28 a3=ffffc01196c8 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0119578 a2=28 a3=ffffc01196a8 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0119598 a2=28 a3=ffffc01196c8 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0119568 a2=28 a3=ffffc0119698 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc01195e8 a2=28 a3=ffffc0119728 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc0119320 a2=50 a3=0 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit: BPF prog-id=100 op=LOAD Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc0119328 a2=94 a3=5 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc0119430 a2=50 a3=0 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc0119578 a2=4 a3=3 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.500000 audit[2749]: AVC avc: denied { confidentiality } for pid=2749 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:54.500000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc0119558 a2=94 a3=6 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { confidentiality } for pid=2749 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:54.501000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc0118d28 a2=94 a3=83 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.501000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { confidentiality } for pid=2749 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:54.501000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc0118d28 a2=94 a3=83 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.501000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc011a768 a2=10 a3=ffffc011a858 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.501000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc011a628 a2=10 a3=ffffc011a718 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.501000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc011a598 a2=10 a3=ffffc011a718 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.501000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.501000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:54.501000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc011a598 a2=10 a3=ffffc011a718 items=0 ppid=2585 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.501000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:10:54.508000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:10:54.597000 audit[2772]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:10:54.597000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff3c74c10 a2=0 a3=ffff90f3cfa8 items=0 ppid=2585 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.597000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:10:54.605000 audit[2775]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:10:54.605000 audit[2775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd639baa0 a2=0 a3=ffff894a0fa8 items=0 ppid=2585 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.605000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:10:54.620000 audit[2774]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:10:54.620000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe5d30610 a2=0 a3=ffff9da1bfa8 items=0 ppid=2585 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.620000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:10:54.645000 audit[2773]: NETFILTER_CFG table=raw:71 family=2 entries=21 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:10:54.645000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe1212ae0 a2=0 a3=ffffbe124fa8 items=0 ppid=2585 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.645000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:10:54.877535 kubelet[1972]: E1213 14:10:54.877498 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:55.715845 systemd-networkd[1598]: vxlan.calico: Gained IPv6LL Dec 13 14:10:55.878248 kubelet[1972]: E1213 14:10:55.878208 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:56.878998 kubelet[1972]: E1213 14:10:56.878951 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:57.879455 kubelet[1972]: E1213 14:10:57.879418 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:58.880581 kubelet[1972]: E1213 14:10:58.880540 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:59.880932 kubelet[1972]: E1213 14:10:59.880895 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:59.980349 env[1449]: time="2024-12-13T14:10:59.980301040Z" level=info msg="StopPodSandbox for \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\"" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.131 [INFO][2807] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.131 [INFO][2807] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" iface="eth0" netns="/var/run/netns/cni-9775c9c9-8d1e-4017-2f7a-b91af22e7a77" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.132 [INFO][2807] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" iface="eth0" netns="/var/run/netns/cni-9775c9c9-8d1e-4017-2f7a-b91af22e7a77" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.132 [INFO][2807] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" iface="eth0" netns="/var/run/netns/cni-9775c9c9-8d1e-4017-2f7a-b91af22e7a77" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.132 [INFO][2807] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.132 [INFO][2807] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.149 [INFO][2813] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" HandleID="k8s-pod-network.2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.149 [INFO][2813] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.149 [INFO][2813] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.159 [WARNING][2813] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" HandleID="k8s-pod-network.2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.159 [INFO][2813] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" HandleID="k8s-pod-network.2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.161 [INFO][2813] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:00.163978 env[1449]: 2024-12-13 14:11:00.162 [INFO][2807] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:00.166031 systemd[1]: run-netns-cni\x2d9775c9c9\x2d8d1e\x2d4017\x2d2f7a\x2db91af22e7a77.mount: Deactivated successfully. Dec 13 14:11:00.166479 env[1449]: time="2024-12-13T14:11:00.166428691Z" level=info msg="TearDown network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\" successfully" Dec 13 14:11:00.166569 env[1449]: time="2024-12-13T14:11:00.166553710Z" level=info msg="StopPodSandbox for \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\" returns successfully" Dec 13 14:11:00.167663 env[1449]: time="2024-12-13T14:11:00.167635443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-89tn6,Uid:764a7370-a0e6-4029-ad3b-e632cff4d05e,Namespace:calico-system,Attempt:1,}" Dec 13 14:11:00.299670 systemd-networkd[1598]: calif0340e740a5: Link UP Dec 13 14:11:00.312502 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:11:00.312589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif0340e740a5: link becomes ready Dec 13 14:11:00.312910 systemd-networkd[1598]: calif0340e740a5: Gained carrier Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.236 [INFO][2820] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.31-k8s-csi--node--driver--89tn6-eth0 csi-node-driver- calico-system 764a7370-a0e6-4029-ad3b-e632cff4d05e 1214 0 2024-12-13 14:10:34 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.31 csi-node-driver-89tn6 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calif0340e740a5 [] []}} ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Namespace="calico-system" Pod="csi-node-driver-89tn6" WorkloadEndpoint="10.200.20.31-k8s-csi--node--driver--89tn6-" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.236 [INFO][2820] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Namespace="calico-system" Pod="csi-node-driver-89tn6" WorkloadEndpoint="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.259 [INFO][2832] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" HandleID="k8s-pod-network.cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.271 [INFO][2832] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" HandleID="k8s-pod-network.cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000316ab0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.31", "pod":"csi-node-driver-89tn6", "timestamp":"2024-12-13 14:11:00.259525956 +0000 UTC"}, Hostname:"10.200.20.31", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.271 [INFO][2832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.271 [INFO][2832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.271 [INFO][2832] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.31' Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.272 [INFO][2832] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" host="10.200.20.31" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.275 [INFO][2832] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.31" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.278 [INFO][2832] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.280 [INFO][2832] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.281 [INFO][2832] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.281 [INFO][2832] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" host="10.200.20.31" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.283 [INFO][2832] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2 Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.288 [INFO][2832] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" host="10.200.20.31" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.295 [INFO][2832] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.129/26] block=192.168.34.128/26 handle="k8s-pod-network.cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" host="10.200.20.31" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.295 [INFO][2832] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.129/26] handle="k8s-pod-network.cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" host="10.200.20.31" Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.295 [INFO][2832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:00.334055 env[1449]: 2024-12-13 14:11:00.295 [INFO][2832] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.129/26] IPv6=[] ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" HandleID="k8s-pod-network.cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.334632 env[1449]: 2024-12-13 14:11:00.297 [INFO][2820] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Namespace="calico-system" Pod="csi-node-driver-89tn6" WorkloadEndpoint="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-csi--node--driver--89tn6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"764a7370-a0e6-4029-ad3b-e632cff4d05e", ResourceVersion:"1214", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"", Pod:"csi-node-driver-89tn6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif0340e740a5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:00.334632 env[1449]: 2024-12-13 14:11:00.297 [INFO][2820] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.129/32] ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Namespace="calico-system" Pod="csi-node-driver-89tn6" WorkloadEndpoint="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.334632 env[1449]: 2024-12-13 14:11:00.297 [INFO][2820] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif0340e740a5 ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Namespace="calico-system" Pod="csi-node-driver-89tn6" WorkloadEndpoint="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.334632 env[1449]: 2024-12-13 14:11:00.313 [INFO][2820] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Namespace="calico-system" Pod="csi-node-driver-89tn6" WorkloadEndpoint="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.334632 env[1449]: 2024-12-13 14:11:00.313 [INFO][2820] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Namespace="calico-system" Pod="csi-node-driver-89tn6" WorkloadEndpoint="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-csi--node--driver--89tn6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"764a7370-a0e6-4029-ad3b-e632cff4d05e", ResourceVersion:"1214", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2", Pod:"csi-node-driver-89tn6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif0340e740a5", MAC:"02:03:96:20:03:9a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:00.334632 env[1449]: 2024-12-13 14:11:00.326 [INFO][2820] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2" Namespace="calico-system" Pod="csi-node-driver-89tn6" WorkloadEndpoint="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:00.336000 audit[2854]: NETFILTER_CFG table=filter:72 family=2 entries=34 op=nft_register_chain pid=2854 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:11:00.343559 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 14:11:00.343655 kernel: audit: type=1325 audit(1734099060.336:651): table=filter:72 family=2 entries=34 op=nft_register_chain pid=2854 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:11:00.336000 audit[2854]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffdcb67c30 a2=0 a3=ffffa949bfa8 items=0 ppid=2585 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:00.385160 kernel: audit: type=1300 audit(1734099060.336:651): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffdcb67c30 a2=0 a3=ffffa949bfa8 items=0 ppid=2585 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:00.336000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:11:00.405086 kernel: audit: type=1327 audit(1734099060.336:651): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:11:00.405322 env[1449]: time="2024-12-13T14:11:00.392273320Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:11:00.405322 env[1449]: time="2024-12-13T14:11:00.392311833Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:11:00.405322 env[1449]: time="2024-12-13T14:11:00.392321912Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:11:00.405322 env[1449]: time="2024-12-13T14:11:00.392444971Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2 pid=2863 runtime=io.containerd.runc.v2 Dec 13 14:11:00.418200 systemd[1]: Started cri-containerd-cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2.scope. Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.467386 kernel: audit: type=1400 audit(1734099060.431:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.467473 kernel: audit: type=1400 audit(1734099060.431:653): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.467502 kernel: audit: type=1400 audit(1734099060.431:654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.519901 kernel: audit: type=1400 audit(1734099060.431:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.520060 kernel: audit: type=1400 audit(1734099060.431:656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.520091 kernel: audit: type=1400 audit(1734099060.431:657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.554762 kernel: audit: type=1400 audit(1734099060.431:658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.431000 audit: BPF prog-id=101 op=LOAD Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:00.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362333262343939626538366463316630656332653666656439353162 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:00.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362333262343939626538366463316630656332653666656439353162 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.434000 audit: BPF prog-id=102 op=LOAD Dec 13 14:11:00.434000 audit[2872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:00.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362333262343939626538366463316630656332653666656439353162 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit: BPF prog-id=103 op=LOAD Dec 13 14:11:00.449000 audit[2872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:00.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362333262343939626538366463316630656332653666656439353162 Dec 13 14:11:00.449000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:11:00.449000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:00.449000 audit: BPF prog-id=104 op=LOAD Dec 13 14:11:00.449000 audit[2872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:00.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362333262343939626538366463316630656332653666656439353162 Dec 13 14:11:00.562366 env[1449]: time="2024-12-13T14:11:00.562329866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-89tn6,Uid:764a7370-a0e6-4029-ad3b-e632cff4d05e,Namespace:calico-system,Attempt:1,} returns sandbox id \"cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2\"" Dec 13 14:11:00.564227 env[1449]: time="2024-12-13T14:11:00.564196385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:11:00.881356 kubelet[1972]: E1213 14:11:00.881311 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:01.166577 systemd[1]: run-containerd-runc-k8s.io-cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2-runc.WEUV57.mount: Deactivated successfully. Dec 13 14:11:01.814815 env[1449]: time="2024-12-13T14:11:01.814767301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:01.822015 env[1449]: time="2024-12-13T14:11:01.821977531Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:01.824982 env[1449]: time="2024-12-13T14:11:01.824953431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:01.829913 env[1449]: time="2024-12-13T14:11:01.829876285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:01.830465 env[1449]: time="2024-12-13T14:11:01.830437911Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:11:01.832673 env[1449]: time="2024-12-13T14:11:01.832645900Z" level=info msg="CreateContainer within sandbox \"cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:11:01.861605 systemd-networkd[1598]: calif0340e740a5: Gained IPv6LL Dec 13 14:11:01.865555 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2988627668.mount: Deactivated successfully. Dec 13 14:11:01.881788 kubelet[1972]: E1213 14:11:01.881757 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:01.882232 env[1449]: time="2024-12-13T14:11:01.882191624Z" level=info msg="CreateContainer within sandbox \"cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d1f4d80b5393386b9dc8899e1a9b1ef174915727ef7dc5411fffde6bd72a0fca\"" Dec 13 14:11:01.882860 env[1449]: time="2024-12-13T14:11:01.882768687Z" level=info msg="StartContainer for \"d1f4d80b5393386b9dc8899e1a9b1ef174915727ef7dc5411fffde6bd72a0fca\"" Dec 13 14:11:01.902613 systemd[1]: Started cri-containerd-d1f4d80b5393386b9dc8899e1a9b1ef174915727ef7dc5411fffde6bd72a0fca.scope. Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2863 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:01.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431663464383062353339333338366239646338383939653161396231 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.918000 audit: BPF prog-id=105 op=LOAD Dec 13 14:11:01.918000 audit[2904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2863 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:01.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431663464383062353339333338366239646338383939653161396231 Dec 13 14:11:01.919000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.919000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.919000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.919000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.919000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.919000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.919000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.919000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.919000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.919000 audit: BPF prog-id=106 op=LOAD Dec 13 14:11:01.919000 audit[2904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2863 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:01.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431663464383062353339333338366239646338383939653161396231 Dec 13 14:11:01.920000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:11:01.920000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:01.920000 audit: BPF prog-id=107 op=LOAD Dec 13 14:11:01.920000 audit[2904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2863 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:01.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431663464383062353339333338366239646338383939653161396231 Dec 13 14:11:01.937390 env[1449]: time="2024-12-13T14:11:01.937349806Z" level=info msg="StartContainer for \"d1f4d80b5393386b9dc8899e1a9b1ef174915727ef7dc5411fffde6bd72a0fca\" returns successfully" Dec 13 14:11:01.938813 env[1449]: time="2024-12-13T14:11:01.938764849Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:11:02.166726 systemd[1]: run-containerd-runc-k8s.io-d1f4d80b5393386b9dc8899e1a9b1ef174915727ef7dc5411fffde6bd72a0fca-runc.tZg8pQ.mount: Deactivated successfully. Dec 13 14:11:02.882461 kubelet[1972]: E1213 14:11:02.882426 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:02.980690 env[1449]: time="2024-12-13T14:11:02.980618895Z" level=info msg="StopPodSandbox for \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\"" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.022 [INFO][2942] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.022 [INFO][2942] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" iface="eth0" netns="/var/run/netns/cni-122467ea-b2a4-626e-49de-91a69e692550" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.023 [INFO][2942] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" iface="eth0" netns="/var/run/netns/cni-122467ea-b2a4-626e-49de-91a69e692550" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.023 [INFO][2942] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" iface="eth0" netns="/var/run/netns/cni-122467ea-b2a4-626e-49de-91a69e692550" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.023 [INFO][2942] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.023 [INFO][2942] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.043 [INFO][2949] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" HandleID="k8s-pod-network.53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.043 [INFO][2949] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.043 [INFO][2949] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.057 [WARNING][2949] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" HandleID="k8s-pod-network.53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.057 [INFO][2949] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" HandleID="k8s-pod-network.53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.061 [INFO][2949] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:03.064235 env[1449]: 2024-12-13 14:11:03.062 [INFO][2942] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:03.066445 env[1449]: time="2024-12-13T14:11:03.066404500Z" level=info msg="TearDown network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\" successfully" Dec 13 14:11:03.066546 env[1449]: time="2024-12-13T14:11:03.066529760Z" level=info msg="StopPodSandbox for \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\" returns successfully" Dec 13 14:11:03.067034 systemd[1]: run-netns-cni\x2d122467ea\x2db2a4\x2d626e\x2d49de\x2d91a69e692550.mount: Deactivated successfully. Dec 13 14:11:03.068461 env[1449]: time="2024-12-13T14:11:03.068431296Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-5r9h7,Uid:5073e666-f20c-4374-a04e-64e2c950270f,Namespace:default,Attempt:1,}" Dec 13 14:11:03.266391 systemd-networkd[1598]: calic7083c44f17: Link UP Dec 13 14:11:03.278915 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:11:03.279019 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic7083c44f17: link becomes ready Dec 13 14:11:03.279701 systemd-networkd[1598]: calic7083c44f17: Gained carrier Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.193 [INFO][2955] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0 nginx-deployment-6d5f899847- default 5073e666-f20c-4374-a04e-64e2c950270f 1229 0 2024-12-13 14:10:48 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.31 nginx-deployment-6d5f899847-5r9h7 eth0 default [] [] [kns.default ksa.default.default] calic7083c44f17 [] []}} ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Namespace="default" Pod="nginx-deployment-6d5f899847-5r9h7" WorkloadEndpoint="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.194 [INFO][2955] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Namespace="default" Pod="nginx-deployment-6d5f899847-5r9h7" WorkloadEndpoint="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.218 [INFO][2967] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" HandleID="k8s-pod-network.e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.230 [INFO][2967] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" HandleID="k8s-pod-network.e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400031e7f0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.31", "pod":"nginx-deployment-6d5f899847-5r9h7", "timestamp":"2024-12-13 14:11:03.218421158 +0000 UTC"}, Hostname:"10.200.20.31", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.230 [INFO][2967] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.230 [INFO][2967] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.230 [INFO][2967] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.31' Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.231 [INFO][2967] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" host="10.200.20.31" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.234 [INFO][2967] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.31" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.238 [INFO][2967] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.239 [INFO][2967] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.241 [INFO][2967] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.241 [INFO][2967] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" host="10.200.20.31" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.243 [INFO][2967] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603 Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.247 [INFO][2967] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" host="10.200.20.31" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.255 [INFO][2967] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.130/26] block=192.168.34.128/26 handle="k8s-pod-network.e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" host="10.200.20.31" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.255 [INFO][2967] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.130/26] handle="k8s-pod-network.e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" host="10.200.20.31" Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.255 [INFO][2967] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:03.290162 env[1449]: 2024-12-13 14:11:03.255 [INFO][2967] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.130/26] IPv6=[] ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" HandleID="k8s-pod-network.e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.290705 env[1449]: 2024-12-13 14:11:03.257 [INFO][2955] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Namespace="default" Pod="nginx-deployment-6d5f899847-5r9h7" WorkloadEndpoint="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5073e666-f20c-4374-a04e-64e2c950270f", ResourceVersion:"1229", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"", Pod:"nginx-deployment-6d5f899847-5r9h7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic7083c44f17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:03.290705 env[1449]: 2024-12-13 14:11:03.257 [INFO][2955] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.130/32] ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Namespace="default" Pod="nginx-deployment-6d5f899847-5r9h7" WorkloadEndpoint="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.290705 env[1449]: 2024-12-13 14:11:03.257 [INFO][2955] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic7083c44f17 ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Namespace="default" Pod="nginx-deployment-6d5f899847-5r9h7" WorkloadEndpoint="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.290705 env[1449]: 2024-12-13 14:11:03.279 [INFO][2955] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Namespace="default" Pod="nginx-deployment-6d5f899847-5r9h7" WorkloadEndpoint="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.290705 env[1449]: 2024-12-13 14:11:03.279 [INFO][2955] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Namespace="default" Pod="nginx-deployment-6d5f899847-5r9h7" WorkloadEndpoint="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5073e666-f20c-4374-a04e-64e2c950270f", ResourceVersion:"1229", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603", Pod:"nginx-deployment-6d5f899847-5r9h7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic7083c44f17", MAC:"22:25:bf:20:61:77", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:03.290705 env[1449]: 2024-12-13 14:11:03.286 [INFO][2955] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603" Namespace="default" Pod="nginx-deployment-6d5f899847-5r9h7" WorkloadEndpoint="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:03.296000 audit[2982]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:11:03.296000 audit[2982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=fffff517ce20 a2=0 a3=ffff864f5fa8 items=0 ppid=2585 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.296000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:11:03.319813 env[1449]: time="2024-12-13T14:11:03.317888137Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:11:03.319813 env[1449]: time="2024-12-13T14:11:03.317936530Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:11:03.319813 env[1449]: time="2024-12-13T14:11:03.317949607Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:11:03.319813 env[1449]: time="2024-12-13T14:11:03.318157574Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603 pid=2995 runtime=io.containerd.runc.v2 Dec 13 14:11:03.325719 env[1449]: time="2024-12-13T14:11:03.325667174Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:03.329636 env[1449]: time="2024-12-13T14:11:03.329584027Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:03.340688 systemd[1]: run-containerd-runc-k8s.io-e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603-runc.GBsdBp.mount: Deactivated successfully. Dec 13 14:11:03.343217 env[1449]: time="2024-12-13T14:11:03.343185053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:03.346515 env[1449]: time="2024-12-13T14:11:03.346466049Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:11:03.346607 env[1449]: time="2024-12-13T14:11:03.346581070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:03.349765 systemd[1]: Started cri-containerd-e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603.scope. Dec 13 14:11:03.354917 env[1449]: time="2024-12-13T14:11:03.354884263Z" level=info msg="CreateContainer within sandbox \"cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit: BPF prog-id=108 op=LOAD Dec 13 14:11:03.361000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2995 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536666463663130386462356233373239646265343964393461663464 Dec 13 14:11:03.361000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.361000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2995 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536666463663130386462356233373239646265343964393461663464 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit: BPF prog-id=109 op=LOAD Dec 13 14:11:03.362000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2995 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536666463663130386462356233373239646265343964393461663464 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.362000 audit: BPF prog-id=110 op=LOAD Dec 13 14:11:03.362000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2995 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536666463663130386462356233373239646265343964393461663464 Dec 13 14:11:03.363000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:11:03.363000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.363000 audit: BPF prog-id=111 op=LOAD Dec 13 14:11:03.363000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2995 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536666463663130386462356233373239646265343964393461663464 Dec 13 14:11:03.381741 env[1449]: time="2024-12-13T14:11:03.381703056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-5r9h7,Uid:5073e666-f20c-4374-a04e-64e2c950270f,Namespace:default,Attempt:1,} returns sandbox id \"e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603\"" Dec 13 14:11:03.387376 env[1449]: time="2024-12-13T14:11:03.387346713Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:11:03.409652 env[1449]: time="2024-12-13T14:11:03.409603515Z" level=info msg="CreateContainer within sandbox \"cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a75b3f66bfa1eb3c1aa71d9ac68ecf85cbcf1ae9d320a8c345283e7b09dc8cc0\"" Dec 13 14:11:03.410312 env[1449]: time="2024-12-13T14:11:03.410275368Z" level=info msg="StartContainer for \"a75b3f66bfa1eb3c1aa71d9ac68ecf85cbcf1ae9d320a8c345283e7b09dc8cc0\"" Dec 13 14:11:03.425597 systemd[1]: Started cri-containerd-a75b3f66bfa1eb3c1aa71d9ac68ecf85cbcf1ae9d320a8c345283e7b09dc8cc0.scope. Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2863 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137356233663636626661316562336331616137316439616336386563 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit: BPF prog-id=112 op=LOAD Dec 13 14:11:03.438000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2863 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137356233663636626661316562336331616137316439616336386563 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit: BPF prog-id=113 op=LOAD Dec 13 14:11:03.438000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2863 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137356233663636626661316562336331616137316439616336386563 Dec 13 14:11:03.438000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:11:03.438000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:03.438000 audit: BPF prog-id=114 op=LOAD Dec 13 14:11:03.438000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2863 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137356233663636626661316562336331616137316439616336386563 Dec 13 14:11:03.455668 env[1449]: time="2024-12-13T14:11:03.455566327Z" level=info msg="StartContainer for \"a75b3f66bfa1eb3c1aa71d9ac68ecf85cbcf1ae9d320a8c345283e7b09dc8cc0\" returns successfully" Dec 13 14:11:03.883499 kubelet[1972]: E1213 14:11:03.883468 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:03.964176 kubelet[1972]: I1213 14:11:03.964079 1972 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:11:03.964176 kubelet[1972]: I1213 14:11:03.964106 1972 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:11:04.324320 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount482434257.mount: Deactivated successfully. Dec 13 14:11:04.884029 kubelet[1972]: E1213 14:11:04.883974 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:04.931283 systemd-networkd[1598]: calic7083c44f17: Gained IPv6LL Dec 13 14:11:05.885049 kubelet[1972]: E1213 14:11:05.885014 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:06.098174 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3516213600.mount: Deactivated successfully. Dec 13 14:11:06.885827 kubelet[1972]: E1213 14:11:06.885764 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:07.316235 env[1449]: time="2024-12-13T14:11:07.316171276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:07.323996 env[1449]: time="2024-12-13T14:11:07.323943027Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:07.329198 env[1449]: time="2024-12-13T14:11:07.329173146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:07.333740 env[1449]: time="2024-12-13T14:11:07.333713447Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:07.334370 env[1449]: time="2024-12-13T14:11:07.334338996Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:11:07.336889 env[1449]: time="2024-12-13T14:11:07.336854470Z" level=info msg="CreateContainer within sandbox \"e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:11:07.365090 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1593328386.mount: Deactivated successfully. Dec 13 14:11:07.370999 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1212704573.mount: Deactivated successfully. Dec 13 14:11:07.385331 env[1449]: time="2024-12-13T14:11:07.385292629Z" level=info msg="CreateContainer within sandbox \"e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"a8e551e1056d6bc14e933e4ffb2152c7d7db3dd61fd3288a4353493a95fc95c8\"" Dec 13 14:11:07.386220 env[1449]: time="2024-12-13T14:11:07.386181620Z" level=info msg="StartContainer for \"a8e551e1056d6bc14e933e4ffb2152c7d7db3dd61fd3288a4353493a95fc95c8\"" Dec 13 14:11:07.403865 systemd[1]: Started cri-containerd-a8e551e1056d6bc14e933e4ffb2152c7d7db3dd61fd3288a4353493a95fc95c8.scope. Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422189 kernel: kauditd_printk_skb: 196 callbacks suppressed Dec 13 14:11:07.422257 kernel: audit: type=1400 audit(1734099067.416:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456146 kernel: audit: type=1400 audit(1734099067.416:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456229 kernel: audit: type=1400 audit(1734099067.416:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.489684 kernel: audit: type=1400 audit(1734099067.416:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.506912 kernel: audit: type=1400 audit(1734099067.416:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.524505 kernel: audit: type=1400 audit(1734099067.416:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.541668 kernel: audit: type=1400 audit(1734099067.416:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.576008 kernel: audit: type=1400 audit(1734099067.416:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.592825 kernel: audit: type=1400 audit(1734099067.416:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.592886 kernel: audit: type=1400 audit(1734099067.416:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.416000 audit: BPF prog-id=115 op=LOAD Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2995 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:07.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653535316531303536643662633134653933336534666662323135 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2995 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:07.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653535316531303536643662633134653933336534666662323135 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.422000 audit: BPF prog-id=116 op=LOAD Dec 13 14:11:07.422000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2995 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:07.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653535316531303536643662633134653933336534666662323135 Dec 13 14:11:07.439000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.439000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.439000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.439000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.439000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.439000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.439000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.439000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.439000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.439000 audit: BPF prog-id=117 op=LOAD Dec 13 14:11:07.439000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2995 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:07.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653535316531303536643662633134653933336534666662323135 Dec 13 14:11:07.456000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:11:07.456000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:07.456000 audit: BPF prog-id=118 op=LOAD Dec 13 14:11:07.456000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2995 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:07.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653535316531303536643662633134653933336534666662323135 Dec 13 14:11:07.595320 env[1449]: time="2024-12-13T14:11:07.595280147Z" level=info msg="StartContainer for \"a8e551e1056d6bc14e933e4ffb2152c7d7db3dd61fd3288a4353493a95fc95c8\" returns successfully" Dec 13 14:11:07.886156 kubelet[1972]: E1213 14:11:07.886042 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:08.064600 kubelet[1972]: I1213 14:11:08.064560 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-89tn6" podStartSLOduration=31.281410152 podStartE2EDuration="34.064514156s" podCreationTimestamp="2024-12-13 14:10:34 +0000 UTC" firstStartedPulling="2024-12-13 14:11:00.563681674 +0000 UTC m=+27.416733852" lastFinishedPulling="2024-12-13 14:11:03.346785718 +0000 UTC m=+30.199837856" observedRunningTime="2024-12-13 14:11:04.058158291 +0000 UTC m=+30.911210469" watchObservedRunningTime="2024-12-13 14:11:08.064514156 +0000 UTC m=+34.917566334" Dec 13 14:11:08.064765 kubelet[1972]: I1213 14:11:08.064708 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-5r9h7" podStartSLOduration=16.116436247 podStartE2EDuration="20.064679613s" podCreationTimestamp="2024-12-13 14:10:48 +0000 UTC" firstStartedPulling="2024-12-13 14:11:03.386336635 +0000 UTC m=+30.239388813" lastFinishedPulling="2024-12-13 14:11:07.334580001 +0000 UTC m=+34.187632179" observedRunningTime="2024-12-13 14:11:08.064394293 +0000 UTC m=+34.917446471" watchObservedRunningTime="2024-12-13 14:11:08.064679613 +0000 UTC m=+34.917731791" Dec 13 14:11:08.886275 kubelet[1972]: E1213 14:11:08.886232 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:09.886795 kubelet[1972]: E1213 14:11:09.886751 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:10.887362 kubelet[1972]: E1213 14:11:10.887320 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:11.888209 kubelet[1972]: E1213 14:11:11.888174 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:12.888572 kubelet[1972]: E1213 14:11:12.888534 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:13.864068 kubelet[1972]: E1213 14:11:13.864036 1972 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:13.889191 kubelet[1972]: E1213 14:11:13.889165 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:14.889618 kubelet[1972]: E1213 14:11:14.889572 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:15.889746 kubelet[1972]: E1213 14:11:15.889689 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:16.487000 audit[3144]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.493683 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:11:16.493795 kernel: audit: type=1325 audit(1734099076.487:719): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.487000 audit[3144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff0d04f80 a2=0 a3=1 items=0 ppid=2185 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.525872 kubelet[1972]: I1213 14:11:16.525838 1972 topology_manager.go:215] "Topology Admit Handler" podUID="414641d9-6e20-4a6a-8528-a996354ed251" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:11:16.530448 systemd[1]: Created slice kubepods-besteffort-pod414641d9_6e20_4a6a_8528_a996354ed251.slice. Dec 13 14:11:16.533994 kernel: audit: type=1300 audit(1734099076.487:719): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff0d04f80 a2=0 a3=1 items=0 ppid=2185 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.547385 kernel: audit: type=1327 audit(1734099076.487:719): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.547529 kernel: audit: type=1325 audit(1734099076.506:720): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.506000 audit[3144]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.506000 audit[3144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff0d04f80 a2=0 a3=1 items=0 ppid=2185 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.566380 kubelet[1972]: I1213 14:11:16.566347 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/414641d9-6e20-4a6a-8528-a996354ed251-data\") pod \"nfs-server-provisioner-0\" (UID: \"414641d9-6e20-4a6a-8528-a996354ed251\") " pod="default/nfs-server-provisioner-0" Dec 13 14:11:16.566605 kubelet[1972]: I1213 14:11:16.566592 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jxkh7\" (UniqueName: \"kubernetes.io/projected/414641d9-6e20-4a6a-8528-a996354ed251-kube-api-access-jxkh7\") pod \"nfs-server-provisioner-0\" (UID: \"414641d9-6e20-4a6a-8528-a996354ed251\") " pod="default/nfs-server-provisioner-0" Dec 13 14:11:16.587130 kernel: audit: type=1300 audit(1734099076.506:720): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff0d04f80 a2=0 a3=1 items=0 ppid=2185 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.600876 kernel: audit: type=1327 audit(1734099076.506:720): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.601000 audit[3148]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.601000 audit[3148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffb3840d0 a2=0 a3=1 items=0 ppid=2185 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.642759 kernel: audit: type=1325 audit(1734099076.601:721): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.642830 kernel: audit: type=1300 audit(1734099076.601:721): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffb3840d0 a2=0 a3=1 items=0 ppid=2185 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.656369 kernel: audit: type=1327 audit(1734099076.601:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.656000 audit[3148]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.656000 audit[3148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffb3840d0 a2=0 a3=1 items=0 ppid=2185 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.656000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.672146 kernel: audit: type=1325 audit(1734099076.656:722): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.834170 env[1449]: time="2024-12-13T14:11:16.834101723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:414641d9-6e20-4a6a-8528-a996354ed251,Namespace:default,Attempt:0,}" Dec 13 14:11:16.890152 kubelet[1972]: E1213 14:11:16.890063 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:16.995325 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:11:16.995434 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:11:16.996194 systemd-networkd[1598]: cali60e51b789ff: Link UP Dec 13 14:11:16.997147 systemd-networkd[1598]: cali60e51b789ff: Gained carrier Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.910 [INFO][3150] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.31-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 414641d9-6e20-4a6a-8528-a996354ed251 1293 0 2024-12-13 14:11:16 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.31 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.31-k8s-nfs--server--provisioner--0-" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.910 [INFO][3150] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.932 [INFO][3163] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" HandleID="k8s-pod-network.624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Workload="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.943 [INFO][3163] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" HandleID="k8s-pod-network.624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Workload="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000317930), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.31", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:11:16.932227394 +0000 UTC"}, Hostname:"10.200.20.31", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.943 [INFO][3163] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.944 [INFO][3163] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.944 [INFO][3163] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.31' Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.945 [INFO][3163] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" host="10.200.20.31" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.948 [INFO][3163] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.31" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.952 [INFO][3163] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.954 [INFO][3163] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.956 [INFO][3163] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.956 [INFO][3163] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" host="10.200.20.31" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.957 [INFO][3163] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6 Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.962 [INFO][3163] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" host="10.200.20.31" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.971 [INFO][3163] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.131/26] block=192.168.34.128/26 handle="k8s-pod-network.624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" host="10.200.20.31" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.971 [INFO][3163] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.131/26] handle="k8s-pod-network.624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" host="10.200.20.31" Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.971 [INFO][3163] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:17.009016 env[1449]: 2024-12-13 14:11:16.971 [INFO][3163] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.131/26] IPv6=[] ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" HandleID="k8s-pod-network.624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Workload="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:11:17.009659 env[1449]: 2024-12-13 14:11:16.973 [INFO][3150] cni-plugin/k8s.go 386: Populated endpoint ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"414641d9-6e20-4a6a-8528-a996354ed251", ResourceVersion:"1293", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 11, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:17.009659 env[1449]: 2024-12-13 14:11:16.973 [INFO][3150] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.131/32] ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:11:17.009659 env[1449]: 2024-12-13 14:11:16.973 [INFO][3150] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:11:17.009659 env[1449]: 2024-12-13 14:11:16.997 [INFO][3150] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:11:17.010902 env[1449]: 2024-12-13 14:11:16.997 [INFO][3150] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"414641d9-6e20-4a6a-8528-a996354ed251", ResourceVersion:"1293", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 11, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"d6:5f:1c:a7:ca:55", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:17.010902 env[1449]: 2024-12-13 14:11:17.007 [INFO][3150] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.31-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:11:17.018000 audit[3184]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3184 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:11:17.018000 audit[3184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=fffff7613580 a2=0 a3=ffff87eadfa8 items=0 ppid=2585 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:17.018000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:11:17.025823 env[1449]: time="2024-12-13T14:11:17.025753194Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:11:17.025823 env[1449]: time="2024-12-13T14:11:17.025796189Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:11:17.026012 env[1449]: time="2024-12-13T14:11:17.025806387Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:11:17.026081 env[1449]: time="2024-12-13T14:11:17.026029241Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6 pid=3192 runtime=io.containerd.runc.v2 Dec 13 14:11:17.044013 systemd[1]: Started cri-containerd-624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6.scope. Dec 13 14:11:17.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.056000 audit: BPF prog-id=119 op=LOAD Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3192 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:17.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346635613835343136326265383235666634356164613962643863 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3192 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:17.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346635613835343136326265383235666634356164613962643863 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit: BPF prog-id=120 op=LOAD Dec 13 14:11:17.057000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3192 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:17.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346635613835343136326265383235666634356164613962643863 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit: BPF prog-id=121 op=LOAD Dec 13 14:11:17.057000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3192 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:17.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346635613835343136326265383235666634356164613962643863 Dec 13 14:11:17.057000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:11:17.057000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:17.057000 audit: BPF prog-id=122 op=LOAD Dec 13 14:11:17.057000 audit[3201]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3192 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:17.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346635613835343136326265383235666634356164613962643863 Dec 13 14:11:17.077594 env[1449]: time="2024-12-13T14:11:17.077545535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:414641d9-6e20-4a6a-8528-a996354ed251,Namespace:default,Attempt:0,} returns sandbox id \"624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6\"" Dec 13 14:11:17.079012 env[1449]: time="2024-12-13T14:11:17.078978529Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:11:17.679821 systemd[1]: run-containerd-runc-k8s.io-624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6-runc.pRFugb.mount: Deactivated successfully. Dec 13 14:11:17.891272 kubelet[1972]: E1213 14:11:17.891226 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:18.179339 systemd-networkd[1598]: cali60e51b789ff: Gained IPv6LL Dec 13 14:11:18.891722 kubelet[1972]: E1213 14:11:18.891675 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:19.283381 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4068487840.mount: Deactivated successfully. Dec 13 14:11:19.892663 kubelet[1972]: E1213 14:11:19.892617 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:20.893255 kubelet[1972]: E1213 14:11:20.892890 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:20.897629 systemd[1]: run-containerd-runc-k8s.io-770f47e6b6c23ab381014d71ce0da413b0ccde6f3330857d52860d26251076a4-runc.gooV22.mount: Deactivated successfully. Dec 13 14:11:21.072031 env[1449]: time="2024-12-13T14:11:21.071196380Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:21.085655 env[1449]: time="2024-12-13T14:11:21.085621718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:21.091367 env[1449]: time="2024-12-13T14:11:21.091340987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:21.097195 env[1449]: time="2024-12-13T14:11:21.097168044Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:21.098109 env[1449]: time="2024-12-13T14:11:21.098082746Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Dec 13 14:11:21.104923 env[1449]: time="2024-12-13T14:11:21.104876100Z" level=info msg="CreateContainer within sandbox \"624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:11:21.132775 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4052988604.mount: Deactivated successfully. Dec 13 14:11:21.152248 env[1449]: time="2024-12-13T14:11:21.151655020Z" level=info msg="CreateContainer within sandbox \"624f5a854162be825ff45ada9bd8ca0c5705e41073e90005b69fd888a781efb6\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"7a6eb22aa58193c9c9619bb195ce45b5a952b6d35db163dcd73a5723f32f7289\"" Dec 13 14:11:21.152856 env[1449]: time="2024-12-13T14:11:21.152816656Z" level=info msg="StartContainer for \"7a6eb22aa58193c9c9619bb195ce45b5a952b6d35db163dcd73a5723f32f7289\"" Dec 13 14:11:21.166815 systemd[1]: Started cri-containerd-7a6eb22aa58193c9c9619bb195ce45b5a952b6d35db163dcd73a5723f32f7289.scope. Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.177000 audit: BPF prog-id=123 op=LOAD Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3192 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:21.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761366562323261613538313933633963393631396262313935636534 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3192 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:21.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761366562323261613538313933633963393631396262313935636534 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.178000 audit: BPF prog-id=124 op=LOAD Dec 13 14:11:21.178000 audit[3254]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3192 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:21.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761366562323261613538313933633963393631396262313935636534 Dec 13 14:11:21.179000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.179000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.179000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.179000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.179000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.179000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.179000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.179000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.179000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.179000 audit: BPF prog-id=125 op=LOAD Dec 13 14:11:21.179000 audit[3254]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3192 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:21.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761366562323261613538313933633963393631396262313935636534 Dec 13 14:11:21.179000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:11:21.179000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:21.180000 audit: BPF prog-id=126 op=LOAD Dec 13 14:11:21.180000 audit[3254]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3192 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:21.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761366562323261613538313933633963393631396262313935636534 Dec 13 14:11:21.201778 env[1449]: time="2024-12-13T14:11:21.201736946Z" level=info msg="StartContainer for \"7a6eb22aa58193c9c9619bb195ce45b5a952b6d35db163dcd73a5723f32f7289\" returns successfully" Dec 13 14:11:21.240000 audit[3280]: AVC avc: denied { search } for pid=3280 comm="rpcbind" name="crypto" dev="proc" ino=21580 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:11:21.240000 audit[3280]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffab57f000 a2=0 a3=0 items=0 ppid=3265 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 key=(null) Dec 13 14:11:21.240000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:11:21.277000 audit[3285]: AVC avc: denied { search } for pid=3285 comm="dbus-daemon" name="crypto" dev="proc" ino=21580 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:11:21.277000 audit[3285]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffafc8f000 a2=0 a3=0 items=0 ppid=3265 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 key=(null) Dec 13 14:11:21.277000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:11:21.280000 audit[3286]: AVC avc: denied { watch } for pid=3286 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538697 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c251,c380 tclass=dir permissive=0 Dec 13 14:11:21.280000 audit[3286]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab0cf9ba40 a2=2c8 a3=aaab0cf80a60 items=0 ppid=3265 pid=3286 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 key=(null) Dec 13 14:11:21.280000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:11:21.285000 audit[3287]: AVC avc: denied { read } for pid=3287 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21663 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:11:21.285000 audit[3287]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff80c1a570 a2=80000 a3=0 items=0 ppid=3265 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 key=(null) Dec 13 14:11:21.285000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:11:21.286000 audit[3287]: AVC avc: denied { search } for pid=3287 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21580 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:11:21.286000 audit[3287]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff7ffaf000 a2=0 a3=0 items=0 ppid=3265 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c380 key=(null) Dec 13 14:11:21.286000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:11:21.892911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount112278244.mount: Deactivated successfully. Dec 13 14:11:21.893296 kubelet[1972]: E1213 14:11:21.893267 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:22.107000 audit[3294]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:22.114249 kernel: kauditd_printk_skb: 134 callbacks suppressed Dec 13 14:11:22.114353 kernel: audit: type=1325 audit(1734099082.107:765): table=filter:79 family=2 entries=20 op=nft_register_rule pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:22.107000 audit[3294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffc68f840 a2=0 a3=1 items=0 ppid=2185 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:22.155412 kernel: audit: type=1300 audit(1734099082.107:765): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffc68f840 a2=0 a3=1 items=0 ppid=2185 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:22.155547 kernel: audit: type=1327 audit(1734099082.107:765): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:22.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:22.127000 audit[3294]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:22.182814 kernel: audit: type=1325 audit(1734099082.127:766): table=nat:80 family=2 entries=106 op=nft_register_chain pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:22.127000 audit[3294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffffc68f840 a2=0 a3=1 items=0 ppid=2185 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:22.209673 kernel: audit: type=1300 audit(1734099082.127:766): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffffc68f840 a2=0 a3=1 items=0 ppid=2185 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:22.209791 kernel: audit: type=1327 audit(1734099082.127:766): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:22.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:22.893695 kubelet[1972]: E1213 14:11:22.893663 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:23.894595 kubelet[1972]: E1213 14:11:23.894557 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:24.895419 kubelet[1972]: E1213 14:11:24.895380 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:25.896015 kubelet[1972]: E1213 14:11:25.895984 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:26.896733 kubelet[1972]: E1213 14:11:26.896702 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:27.897226 kubelet[1972]: E1213 14:11:27.897184 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:28.898642 kubelet[1972]: E1213 14:11:28.898603 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:29.899496 kubelet[1972]: E1213 14:11:29.899460 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:30.900520 kubelet[1972]: E1213 14:11:30.900483 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:31.901515 kubelet[1972]: E1213 14:11:31.901466 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:32.901692 kubelet[1972]: E1213 14:11:32.901656 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:33.864265 kubelet[1972]: E1213 14:11:33.864224 1972 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:33.879577 env[1449]: time="2024-12-13T14:11:33.879272192Z" level=info msg="StopPodSandbox for \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\"" Dec 13 14:11:33.902290 kubelet[1972]: E1213 14:11:33.902252 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.913 [WARNING][3331] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-csi--node--driver--89tn6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"764a7370-a0e6-4029-ad3b-e632cff4d05e", ResourceVersion:"1242", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2", Pod:"csi-node-driver-89tn6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif0340e740a5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.913 [INFO][3331] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.913 [INFO][3331] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" iface="eth0" netns="" Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.913 [INFO][3331] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.913 [INFO][3331] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.929 [INFO][3337] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" HandleID="k8s-pod-network.2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.930 [INFO][3337] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.930 [INFO][3337] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.941 [WARNING][3337] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" HandleID="k8s-pod-network.2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.941 [INFO][3337] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" HandleID="k8s-pod-network.2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.943 [INFO][3337] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:33.945424 env[1449]: 2024-12-13 14:11:33.944 [INFO][3331] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:33.945914 env[1449]: time="2024-12-13T14:11:33.945883202Z" level=info msg="TearDown network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\" successfully" Dec 13 14:11:33.945984 env[1449]: time="2024-12-13T14:11:33.945969355Z" level=info msg="StopPodSandbox for \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\" returns successfully" Dec 13 14:11:33.946649 env[1449]: time="2024-12-13T14:11:33.946618819Z" level=info msg="RemovePodSandbox for \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\"" Dec 13 14:11:33.946728 env[1449]: time="2024-12-13T14:11:33.946654256Z" level=info msg="Forcibly stopping sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\"" Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:33.980 [WARNING][3355] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-csi--node--driver--89tn6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"764a7370-a0e6-4029-ad3b-e632cff4d05e", ResourceVersion:"1242", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"cb32b499be86dc1f0ec2e6fed951b92c982fc66317a8777701a911d1004906d2", Pod:"csi-node-driver-89tn6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif0340e740a5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:33.980 [INFO][3355] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:33.980 [INFO][3355] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" iface="eth0" netns="" Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:33.980 [INFO][3355] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:33.980 [INFO][3355] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:34.004 [INFO][3361] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" HandleID="k8s-pod-network.2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:34.004 [INFO][3361] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:34.004 [INFO][3361] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:34.013 [WARNING][3361] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" HandleID="k8s-pod-network.2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:34.013 [INFO][3361] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" HandleID="k8s-pod-network.2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Workload="10.200.20.31-k8s-csi--node--driver--89tn6-eth0" Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:34.014 [INFO][3361] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:34.016330 env[1449]: 2024-12-13 14:11:34.015 [INFO][3355] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582" Dec 13 14:11:34.016874 env[1449]: time="2024-12-13T14:11:34.016844826Z" level=info msg="TearDown network for sandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\" successfully" Dec 13 14:11:34.045226 env[1449]: time="2024-12-13T14:11:34.045185735Z" level=info msg="RemovePodSandbox \"2edb5c1106fc8ac14d2ad06b026d625397e1985cffdf8f13f6ff7c2c2ddf8582\" returns successfully" Dec 13 14:11:34.045952 env[1449]: time="2024-12-13T14:11:34.045930073Z" level=info msg="StopPodSandbox for \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\"" Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.080 [WARNING][3381] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5073e666-f20c-4374-a04e-64e2c950270f", ResourceVersion:"1257", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603", Pod:"nginx-deployment-6d5f899847-5r9h7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic7083c44f17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.080 [INFO][3381] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.080 [INFO][3381] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" iface="eth0" netns="" Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.080 [INFO][3381] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.080 [INFO][3381] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.101 [INFO][3387] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" HandleID="k8s-pod-network.53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.102 [INFO][3387] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.102 [INFO][3387] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.111 [WARNING][3387] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" HandleID="k8s-pod-network.53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.111 [INFO][3387] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" HandleID="k8s-pod-network.53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.112 [INFO][3387] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:34.114674 env[1449]: 2024-12-13 14:11:34.113 [INFO][3381] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:34.115184 env[1449]: time="2024-12-13T14:11:34.115153762Z" level=info msg="TearDown network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\" successfully" Dec 13 14:11:34.115261 env[1449]: time="2024-12-13T14:11:34.115246234Z" level=info msg="StopPodSandbox for \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\" returns successfully" Dec 13 14:11:34.115726 env[1449]: time="2024-12-13T14:11:34.115702916Z" level=info msg="RemovePodSandbox for \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\"" Dec 13 14:11:34.115851 env[1449]: time="2024-12-13T14:11:34.115817186Z" level=info msg="Forcibly stopping sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\"" Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.156 [WARNING][3406] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5073e666-f20c-4374-a04e-64e2c950270f", ResourceVersion:"1257", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"e6fdcf108db5b3729dbe49d94af4d20fb83c771c388e09825aa9c2e14fd90603", Pod:"nginx-deployment-6d5f899847-5r9h7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic7083c44f17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.156 [INFO][3406] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.156 [INFO][3406] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" iface="eth0" netns="" Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.156 [INFO][3406] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.156 [INFO][3406] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.172 [INFO][3413] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" HandleID="k8s-pod-network.53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.173 [INFO][3413] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.173 [INFO][3413] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.181 [WARNING][3413] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" HandleID="k8s-pod-network.53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.181 [INFO][3413] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" HandleID="k8s-pod-network.53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Workload="10.200.20.31-k8s-nginx--deployment--6d5f899847--5r9h7-eth0" Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.183 [INFO][3413] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:34.185436 env[1449]: 2024-12-13 14:11:34.184 [INFO][3406] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356" Dec 13 14:11:34.186004 env[1449]: time="2024-12-13T14:11:34.185958998Z" level=info msg="TearDown network for sandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\" successfully" Dec 13 14:11:34.194914 env[1449]: time="2024-12-13T14:11:34.194863533Z" level=info msg="RemovePodSandbox \"53c6a8ce7c432b741d91bdc17a29b40b16a49c0eed25c71496cf1d3bc6ab6356\" returns successfully" Dec 13 14:11:34.903019 kubelet[1972]: E1213 14:11:34.902961 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:35.903476 kubelet[1972]: E1213 14:11:35.903420 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:36.903645 kubelet[1972]: E1213 14:11:36.903615 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:37.905082 kubelet[1972]: E1213 14:11:37.905044 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:38.905431 kubelet[1972]: E1213 14:11:38.905398 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:39.906580 kubelet[1972]: E1213 14:11:39.906542 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:40.906736 kubelet[1972]: E1213 14:11:40.906677 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:41.907634 kubelet[1972]: E1213 14:11:41.907600 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:42.908581 kubelet[1972]: E1213 14:11:42.908549 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:43.909445 kubelet[1972]: E1213 14:11:43.909396 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:44.909601 kubelet[1972]: E1213 14:11:44.909556 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:45.910232 kubelet[1972]: E1213 14:11:45.910193 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:45.975586 kubelet[1972]: I1213 14:11:45.975553 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=25.951154583 podStartE2EDuration="29.975513077s" podCreationTimestamp="2024-12-13 14:11:16 +0000 UTC" firstStartedPulling="2024-12-13 14:11:17.078715359 +0000 UTC m=+43.931767537" lastFinishedPulling="2024-12-13 14:11:21.103073853 +0000 UTC m=+47.956126031" observedRunningTime="2024-12-13 14:11:22.093628489 +0000 UTC m=+48.946680667" watchObservedRunningTime="2024-12-13 14:11:45.975513077 +0000 UTC m=+72.828565255" Dec 13 14:11:45.975771 kubelet[1972]: I1213 14:11:45.975662 1972 topology_manager.go:215] "Topology Admit Handler" podUID="bb9dc29a-9625-48a8-b151-1c908e0aee4d" podNamespace="default" podName="test-pod-1" Dec 13 14:11:45.980202 systemd[1]: Created slice kubepods-besteffort-podbb9dc29a_9625_48a8_b151_1c908e0aee4d.slice. Dec 13 14:11:46.011468 kubelet[1972]: I1213 14:11:46.011438 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-22c2afa1-629d-41f4-989f-1964fb8b15b2\" (UniqueName: \"kubernetes.io/nfs/bb9dc29a-9625-48a8-b151-1c908e0aee4d-pvc-22c2afa1-629d-41f4-989f-1964fb8b15b2\") pod \"test-pod-1\" (UID: \"bb9dc29a-9625-48a8-b151-1c908e0aee4d\") " pod="default/test-pod-1" Dec 13 14:11:46.011607 kubelet[1972]: I1213 14:11:46.011490 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s6r87\" (UniqueName: \"kubernetes.io/projected/bb9dc29a-9625-48a8-b151-1c908e0aee4d-kube-api-access-s6r87\") pod \"test-pod-1\" (UID: \"bb9dc29a-9625-48a8-b151-1c908e0aee4d\") " pod="default/test-pod-1" Dec 13 14:11:46.237000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.264726 kernel: audit: type=1400 audit(1734099106.237:767): avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.264830 kernel: Failed to create system directory netfs Dec 13 14:11:46.269403 kernel: Failed to create system directory netfs Dec 13 14:11:46.269464 kernel: audit: type=1400 audit(1734099106.237:767): avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.237000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.293542 kernel: Failed to create system directory netfs Dec 13 14:11:46.293607 kernel: audit: type=1400 audit(1734099106.237:767): avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.237000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.317310 kernel: Failed to create system directory netfs Dec 13 14:11:46.317384 kernel: audit: type=1400 audit(1734099106.237:767): avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.237000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.237000 audit[3432]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf34445e0 a1=12c14 a2=aaaad5bbe028 a3=aaaaf3435010 items=0 ppid=552 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:46.363457 kernel: audit: type=1300 audit(1734099106.237:767): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf34445e0 a1=12c14 a2=aaaad5bbe028 a3=aaaaf3435010 items=0 ppid=552 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:46.237000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:11:46.374027 kernel: audit: type=1327 audit(1734099106.237:767): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.411170 kernel: Failed to create system directory fscache Dec 13 14:11:46.411275 kernel: audit: type=1400 audit(1734099106.382:768): avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.411358 kernel: Failed to create system directory fscache Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.441208 kernel: audit: type=1400 audit(1734099106.382:768): avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.441298 kernel: Failed to create system directory fscache Dec 13 14:11:46.441348 kernel: audit: type=1400 audit(1734099106.382:768): avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.465884 kernel: Failed to create system directory fscache Dec 13 14:11:46.466002 kernel: audit: type=1400 audit(1734099106.382:768): avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.485330 kernel: Failed to create system directory fscache Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.494634 kernel: Failed to create system directory fscache Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.499533 kernel: Failed to create system directory fscache Dec 13 14:11:46.499582 kernel: Failed to create system directory fscache Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.508891 kernel: Failed to create system directory fscache Dec 13 14:11:46.508970 kernel: Failed to create system directory fscache Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.518159 kernel: Failed to create system directory fscache Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.522849 kernel: Failed to create system directory fscache Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.528353 kernel: Failed to create system directory fscache Dec 13 14:11:46.382000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.532854 kernel: Failed to create system directory fscache Dec 13 14:11:46.382000 audit[3432]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf3657210 a1=4c344 a2=aaaad5bbe028 a3=aaaaf3435010 items=0 ppid=552 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:46.537175 kernel: FS-Cache: Loaded Dec 13 14:11:46.382000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.633197 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.633301 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.633335 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.642215 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.642278 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.651226 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.651288 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.659913 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.660005 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.668535 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.673248 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.673314 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.681669 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.681759 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.690189 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.694489 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.698639 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.698690 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.707183 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.707271 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.715219 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.715316 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.723566 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.727671 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.732002 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.732053 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.740202 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.740249 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.744292 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.752223 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.752305 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.760013 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.760064 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.767931 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.767976 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.775934 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.776017 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.783823 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.783875 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.791346 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.791396 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.798997 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.799056 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.806725 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.806772 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.814885 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.814946 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.822251 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.822305 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.829855 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.829913 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.837788 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.837869 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.845275 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.845338 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.852493 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.852563 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.860097 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.860200 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.867585 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.867621 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.875181 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.875273 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.882584 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.882622 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.890514 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.890567 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.894244 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.901732 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.901823 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.905609 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.910038 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.911175 kubelet[1972]: E1213 14:11:46.911099 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:46.913803 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.921215 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.921303 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.925057 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.928920 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.932777 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.936479 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.944329 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.944414 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.947984 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.951569 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.955463 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.959134 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.962859 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.970323 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.970380 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.977776 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.977824 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.981479 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.988885 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.988967 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.996485 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.996537 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.004028 kernel: Failed to create system directory sunrpc Dec 13 14:11:47.004101 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.007845 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.011721 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.015388 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.019319 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.023131 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.027174 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.035063 kernel: Failed to create system directory sunrpc Dec 13 14:11:47.035172 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.042666 kernel: Failed to create system directory sunrpc Dec 13 14:11:47.042724 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.051226 kernel: Failed to create system directory sunrpc Dec 13 14:11:47.051283 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.054818 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.058720 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.062538 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.066430 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.073801 kernel: Failed to create system directory sunrpc Dec 13 14:11:47.073856 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.081303 kernel: Failed to create system directory sunrpc Dec 13 14:11:47.081361 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.084969 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.092329 kernel: Failed to create system directory sunrpc Dec 13 14:11:47.092383 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.099721 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.103686 kernel: Failed to create system directory sunrpc Dec 13 14:11:47.103723 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.110891 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.114927 kernel: Failed to create system directory sunrpc Dec 13 14:11:46.618000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.118752 kernel: Failed to create system directory sunrpc Dec 13 14:11:47.131233 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:11:47.131345 kernel: RPC: Registered udp transport module. Dec 13 14:11:47.131375 kernel: RPC: Registered tcp transport module. Dec 13 14:11:47.134790 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:11:46.618000 audit[3432]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf36a3560 a1=14a504 a2=aaaad5bbe028 a3=aaaaf3435010 items=6 ppid=552 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:46.618000 audit: CWD cwd="/" Dec 13 14:11:46.618000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:11:46.618000 audit: PATH item=1 name=(null) inode=22017 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:11:46.618000 audit: PATH item=2 name=(null) inode=22017 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:11:46.618000 audit: PATH item=3 name=(null) inode=22018 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:11:46.618000 audit: PATH item=4 name=(null) inode=22017 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:11:46.618000 audit: PATH item=5 name=(null) inode=22019 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:11:46.618000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.235806 kernel: Failed to create system directory nfs Dec 13 14:11:47.235882 kernel: Failed to create system directory nfs Dec 13 14:11:47.235909 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.239495 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.246778 kernel: Failed to create system directory nfs Dec 13 14:11:47.246842 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.253817 kernel: Failed to create system directory nfs Dec 13 14:11:47.253904 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.260860 kernel: Failed to create system directory nfs Dec 13 14:11:47.260911 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.264315 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.267862 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.275056 kernel: Failed to create system directory nfs Dec 13 14:11:47.275091 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.282137 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.286183 kernel: Failed to create system directory nfs Dec 13 14:11:47.286242 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.293268 kernel: Failed to create system directory nfs Dec 13 14:11:47.293346 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.300399 kernel: Failed to create system directory nfs Dec 13 14:11:47.300476 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.304187 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.307640 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.311255 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.314799 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.318757 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.322395 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.325972 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.329596 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.337391 kernel: Failed to create system directory nfs Dec 13 14:11:47.337460 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.344600 kernel: Failed to create system directory nfs Dec 13 14:11:47.344674 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.351881 kernel: Failed to create system directory nfs Dec 13 14:11:47.351945 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.355348 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.359006 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.362588 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.370193 kernel: Failed to create system directory nfs Dec 13 14:11:47.370232 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.377218 kernel: Failed to create system directory nfs Dec 13 14:11:47.377270 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.384320 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.388245 kernel: Failed to create system directory nfs Dec 13 14:11:47.388291 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.395271 kernel: Failed to create system directory nfs Dec 13 14:11:47.395320 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.402588 kernel: Failed to create system directory nfs Dec 13 14:11:47.402644 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.409523 kernel: Failed to create system directory nfs Dec 13 14:11:47.409570 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.413445 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.416980 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.423880 kernel: Failed to create system directory nfs Dec 13 14:11:47.423934 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.430931 kernel: Failed to create system directory nfs Dec 13 14:11:47.430989 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.434406 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.438165 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.224000 audit[3432]: AVC avc: denied { confidentiality } for pid=3432 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.445266 kernel: Failed to create system directory nfs Dec 13 14:11:47.224000 audit[3432]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf384c6f0 a1=116204 a2=aaaad5bbe028 a3=aaaaf3435010 items=0 ppid=552 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:47.464297 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:11:47.224000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.544891 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.544952 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.544996 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.551930 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.552032 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.555553 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.559023 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.562487 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.566067 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.573145 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.573201 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.580100 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.580161 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.587533 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.587621 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.594994 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.595030 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.602347 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.602383 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.609359 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.609409 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.617107 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.617183 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.624430 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.628159 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.628205 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.635323 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.635356 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.642500 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.646421 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.646473 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.653720 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.653767 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.660687 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.660754 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.664280 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.671346 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.671384 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.674846 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.681849 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.681904 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.688825 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.688857 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.692397 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.699808 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.699840 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.706806 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.706874 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.710233 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.713825 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.717378 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.720896 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.724385 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.727943 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.731625 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.738646 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.738685 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.745911 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.745943 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.753241 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.753278 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.760505 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.760539 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.767471 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.767519 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.774558 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.774608 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.781501 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.781534 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.788415 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.788478 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.795678 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.795764 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.799183 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.806534 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.806596 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.810006 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.813553 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.820511 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.820577 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.827683 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.827742 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.831155 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.834611 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.841819 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.841894 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.845300 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.848923 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.855906 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.859719 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.859748 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.863181 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.870264 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.870291 kernel: Failed to create system directory nfs4 Dec 13 14:11:47.532000 audit[3438]: AVC avc: denied { confidentiality } for pid=3438 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:47.911449 kubelet[1972]: E1213 14:11:47.911381 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:47.976219 kernel: NFS: Registering the id_resolver key type Dec 13 14:11:47.976344 kernel: Key type id_resolver registered Dec 13 14:11:47.982412 kernel: Key type id_legacy registered Dec 13 14:11:47.532000 audit[3438]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9d04a010 a1=19c49c a2=aaaae3f2e028 a3=aaaae9939010 items=0 ppid=552 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:47.532000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.040885 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.040963 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.044860 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.048589 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.052996 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.056899 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.060789 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.060840 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.068255 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.068309 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.076309 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.076351 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.080003 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.087479 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.087518 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.094959 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.094994 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.098665 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.106329 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.106372 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.110082 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.117467 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.117517 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.124935 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.124991 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.128617 kernel: Failed to create system directory rpcgss Dec 13 14:11:48.031000 audit[3439]: AVC avc: denied { confidentiality } for pid=3439 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:11:48.031000 audit[3439]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8e4a2010 a1=5ee04 a2=aaaacdb4e028 a3=aaaad2b90010 items=0 ppid=552 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:48.031000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:11:48.616046 nfsidmap[3446]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-9396bf5055' Dec 13 14:11:48.653961 nfsidmap[3447]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-9396bf5055' Dec 13 14:11:48.666000 audit[1554]: AVC avc: denied { watch_reads } for pid=1554 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2733 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:11:48.666000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2733 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:11:48.666000 audit[1554]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab1a81a580 a2=10 a3=0 items=0 ppid=1 pid=1554 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:48.666000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:11:48.666000 audit[1554]: AVC avc: denied { watch_reads } for pid=1554 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2733 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:11:48.666000 audit[1554]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab1a81a580 a2=10 a3=0 items=0 ppid=1 pid=1554 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:48.666000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:11:48.667000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2733 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:11:48.683939 env[1449]: time="2024-12-13T14:11:48.683588786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:bb9dc29a-9625-48a8-b151-1c908e0aee4d,Namespace:default,Attempt:0,}" Dec 13 14:11:48.829500 systemd-networkd[1598]: cali5ec59c6bf6e: Link UP Dec 13 14:11:48.841043 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:11:48.841864 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:11:48.841299 systemd-networkd[1598]: cali5ec59c6bf6e: Gained carrier Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.746 [INFO][3449] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.31-k8s-test--pod--1-eth0 default bb9dc29a-9625-48a8-b151-1c908e0aee4d 1392 0 2024-12-13 14:11:17 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.31 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.31-k8s-test--pod--1-" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.746 [INFO][3449] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.31-k8s-test--pod--1-eth0" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.768 [INFO][3461] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" HandleID="k8s-pod-network.8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Workload="10.200.20.31-k8s-test--pod--1-eth0" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.783 [INFO][3461] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" HandleID="k8s-pod-network.8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Workload="10.200.20.31-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003178b0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.31", "pod":"test-pod-1", "timestamp":"2024-12-13 14:11:48.768492388 +0000 UTC"}, Hostname:"10.200.20.31", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.783 [INFO][3461] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.783 [INFO][3461] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.783 [INFO][3461] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.31' Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.785 [INFO][3461] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" host="10.200.20.31" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.789 [INFO][3461] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.31" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.794 [INFO][3461] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.796 [INFO][3461] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.799 [INFO][3461] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="10.200.20.31" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.799 [INFO][3461] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" host="10.200.20.31" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.801 [INFO][3461] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7 Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.809 [INFO][3461] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" host="10.200.20.31" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.825 [INFO][3461] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.132/26] block=192.168.34.128/26 handle="k8s-pod-network.8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" host="10.200.20.31" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.825 [INFO][3461] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.132/26] handle="k8s-pod-network.8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" host="10.200.20.31" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.825 [INFO][3461] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.825 [INFO][3461] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.132/26] IPv6=[] ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" HandleID="k8s-pod-network.8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Workload="10.200.20.31-k8s-test--pod--1-eth0" Dec 13 14:11:48.862593 env[1449]: 2024-12-13 14:11:48.826 [INFO][3449] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.31-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"bb9dc29a-9625-48a8-b151-1c908e0aee4d", ResourceVersion:"1392", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 11, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:48.863331 env[1449]: 2024-12-13 14:11:48.826 [INFO][3449] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.132/32] ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.31-k8s-test--pod--1-eth0" Dec 13 14:11:48.863331 env[1449]: 2024-12-13 14:11:48.826 [INFO][3449] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.31-k8s-test--pod--1-eth0" Dec 13 14:11:48.863331 env[1449]: 2024-12-13 14:11:48.842 [INFO][3449] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.31-k8s-test--pod--1-eth0" Dec 13 14:11:48.863331 env[1449]: 2024-12-13 14:11:48.846 [INFO][3449] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.31-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.31-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"bb9dc29a-9625-48a8-b151-1c908e0aee4d", ResourceVersion:"1392", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 11, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.31", ContainerID:"8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ce:14:48:bf:03:73", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:11:48.863331 env[1449]: 2024-12-13 14:11:48.861 [INFO][3449] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.31-k8s-test--pod--1-eth0" Dec 13 14:11:48.871000 audit[3481]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3481 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:11:48.871000 audit[3481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffcfda0e90 a2=0 a3=ffff8dfeafa8 items=0 ppid=2585 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:48.871000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:11:48.879331 env[1449]: time="2024-12-13T14:11:48.879275728Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:11:48.879640 env[1449]: time="2024-12-13T14:11:48.879581068Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:11:48.879640 env[1449]: time="2024-12-13T14:11:48.879619905Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:11:48.879995 env[1449]: time="2024-12-13T14:11:48.879945003Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7 pid=3488 runtime=io.containerd.runc.v2 Dec 13 14:11:48.892397 systemd[1]: Started cri-containerd-8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7.scope. Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit: BPF prog-id=127 op=LOAD Dec 13 14:11:48.904000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.904000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:48.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373865356466363836666661376630336130633066383136646639 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:48.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373865356466363836666661376630336130633066383136646639 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit: BPF prog-id=128 op=LOAD Dec 13 14:11:48.905000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:48.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373865356466363836666661376630336130633066383136646639 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit: BPF prog-id=129 op=LOAD Dec 13 14:11:48.905000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:48.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373865356466363836666661376630336130633066383136646639 Dec 13 14:11:48.905000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:11:48.905000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:48.905000 audit: BPF prog-id=130 op=LOAD Dec 13 14:11:48.905000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:48.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373865356466363836666661376630336130633066383136646639 Dec 13 14:11:48.911532 kubelet[1972]: E1213 14:11:48.911470 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:48.924415 env[1449]: time="2024-12-13T14:11:48.924366972Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:bb9dc29a-9625-48a8-b151-1c908e0aee4d,Namespace:default,Attempt:0,} returns sandbox id \"8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7\"" Dec 13 14:11:48.926444 env[1449]: time="2024-12-13T14:11:48.926420633Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:11:49.262994 env[1449]: time="2024-12-13T14:11:49.262943010Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:49.269385 env[1449]: time="2024-12-13T14:11:49.269353504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:49.274101 env[1449]: time="2024-12-13T14:11:49.274064071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:49.277027 env[1449]: time="2024-12-13T14:11:49.277000396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:11:49.277699 env[1449]: time="2024-12-13T14:11:49.277673672Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:11:49.279801 env[1449]: time="2024-12-13T14:11:49.279757333Z" level=info msg="CreateContainer within sandbox \"8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:11:49.309401 env[1449]: time="2024-12-13T14:11:49.309318129Z" level=info msg="CreateContainer within sandbox \"8d78e5df686ffa7f03a0c0f816df9da2d5f392eabc4ab9e93253800ddf0a3ce7\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"78d3a04500f8609679809e501b30924b708fa97f6d94fe610778d8064811fa06\"" Dec 13 14:11:49.310056 env[1449]: time="2024-12-13T14:11:49.310007604Z" level=info msg="StartContainer for \"78d3a04500f8609679809e501b30924b708fa97f6d94fe610778d8064811fa06\"" Dec 13 14:11:49.324033 systemd[1]: Started cri-containerd-78d3a04500f8609679809e501b30924b708fa97f6d94fe610778d8064811fa06.scope. Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.336000 audit: BPF prog-id=131 op=LOAD Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3488 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:49.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643361303435303066383630393637393830396535303162333039 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3488 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:49.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643361303435303066383630393637393830396535303162333039 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit: BPF prog-id=132 op=LOAD Dec 13 14:11:49.337000 audit[3530]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3488 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:49.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643361303435303066383630393637393830396535303162333039 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit: BPF prog-id=133 op=LOAD Dec 13 14:11:49.337000 audit[3530]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3488 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:49.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643361303435303066383630393637393830396535303162333039 Dec 13 14:11:49.337000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:11:49.337000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:11:49.337000 audit: BPF prog-id=134 op=LOAD Dec 13 14:11:49.337000 audit[3530]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3488 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:49.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643361303435303066383630393637393830396535303162333039 Dec 13 14:11:49.355984 env[1449]: time="2024-12-13T14:11:49.355940592Z" level=info msg="StartContainer for \"78d3a04500f8609679809e501b30924b708fa97f6d94fe610778d8064811fa06\" returns successfully" Dec 13 14:11:49.911965 kubelet[1972]: E1213 14:11:49.911908 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:50.435311 systemd-networkd[1598]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:11:50.880820 systemd[1]: run-containerd-runc-k8s.io-770f47e6b6c23ab381014d71ce0da413b0ccde6f3330857d52860d26251076a4-runc.jzaoIx.mount: Deactivated successfully. Dec 13 14:11:50.912239 kubelet[1972]: E1213 14:11:50.912196 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:51.913324 kubelet[1972]: E1213 14:11:51.913293 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:52.914048 kubelet[1972]: E1213 14:11:52.914005 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:53.864184 kubelet[1972]: E1213 14:11:53.864144 1972 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:53.915040 kubelet[1972]: E1213 14:11:53.914995 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:54.915479 kubelet[1972]: E1213 14:11:54.915444 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:55.916734 kubelet[1972]: E1213 14:11:55.916702 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:56.917335 kubelet[1972]: E1213 14:11:56.917301 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:57.917579 kubelet[1972]: E1213 14:11:57.917539 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:11:58.918837 kubelet[1972]: E1213 14:11:58.918806 1972 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"