Dec 13 14:08:05.013602 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Dec 13 14:08:05.013619 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:08:05.013628 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Dec 13 14:08:05.013634 kernel: printk: bootconsole [pl11] enabled Dec 13 14:08:05.013640 kernel: efi: EFI v2.70 by EDK II Dec 13 14:08:05.013645 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3ead8b98 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 Dec 13 14:08:05.013652 kernel: random: crng init done Dec 13 14:08:05.013658 kernel: ACPI: Early table checksum verification disabled Dec 13 14:08:05.013663 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Dec 13 14:08:05.013669 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:08:05.013674 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:08:05.013680 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Dec 13 14:08:05.013687 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:08:05.013693 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:08:05.013700 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:08:05.013705 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:08:05.013711 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:08:05.013719 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:08:05.013725 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Dec 13 14:08:05.013731 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:08:05.013737 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Dec 13 14:08:05.013742 kernel: NUMA: Failed to initialise from firmware Dec 13 14:08:05.013748 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:08:05.013754 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Dec 13 14:08:05.013760 kernel: Zone ranges: Dec 13 14:08:05.013784 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Dec 13 14:08:05.013790 kernel: DMA32 empty Dec 13 14:08:05.013796 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:08:05.013804 kernel: Movable zone start for each node Dec 13 14:08:05.013810 kernel: Early memory node ranges Dec 13 14:08:05.013816 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Dec 13 14:08:05.013822 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Dec 13 14:08:05.013828 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Dec 13 14:08:05.013834 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Dec 13 14:08:05.013840 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Dec 13 14:08:05.013846 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Dec 13 14:08:05.013852 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:08:05.013858 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:08:05.013864 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Dec 13 14:08:05.013870 kernel: psci: probing for conduit method from ACPI. Dec 13 14:08:05.013879 kernel: psci: PSCIv1.1 detected in firmware. Dec 13 14:08:05.013886 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:08:05.013892 kernel: psci: MIGRATE_INFO_TYPE not supported. Dec 13 14:08:05.013898 kernel: psci: SMC Calling Convention v1.4 Dec 13 14:08:05.013905 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Dec 13 14:08:05.013912 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Dec 13 14:08:05.013918 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:08:05.013925 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:08:05.013931 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:08:05.013937 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:08:05.013944 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:08:05.013955 kernel: CPU features: detected: Hardware dirty bit management Dec 13 14:08:05.013961 kernel: CPU features: detected: Spectre-BHB Dec 13 14:08:05.013967 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:08:05.013974 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:08:05.013980 kernel: CPU features: detected: ARM erratum 1418040 Dec 13 14:08:05.013988 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Dec 13 14:08:05.013994 kernel: CPU features: detected: SSBS not fully self-synchronizing Dec 13 14:08:05.014000 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Dec 13 14:08:05.014007 kernel: Policy zone: Normal Dec 13 14:08:05.014014 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:08:05.014021 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:08:05.014028 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:08:05.014035 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:08:05.014041 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:08:05.014048 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Dec 13 14:08:05.014054 kernel: Memory: 3986940K/4194160K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 207220K reserved, 0K cma-reserved) Dec 13 14:08:05.014062 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:08:05.014068 kernel: trace event string verifier disabled Dec 13 14:08:05.014075 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:08:05.014081 kernel: rcu: RCU event tracing is enabled. Dec 13 14:08:05.014088 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:08:05.014095 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:08:05.014101 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:08:05.014108 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:08:05.014114 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:08:05.014120 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:08:05.014127 kernel: GICv3: 960 SPIs implemented Dec 13 14:08:05.014134 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:08:05.014140 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:08:05.014146 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:08:05.014153 kernel: GICv3: 16 PPIs implemented Dec 13 14:08:05.014159 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Dec 13 14:08:05.014165 kernel: ITS: No ITS available, not enabling LPIs Dec 13 14:08:05.014172 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:08:05.014178 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Dec 13 14:08:05.014185 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Dec 13 14:08:05.014192 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Dec 13 14:08:05.014198 kernel: Console: colour dummy device 80x25 Dec 13 14:08:05.014206 kernel: printk: console [tty1] enabled Dec 13 14:08:05.014213 kernel: ACPI: Core revision 20210730 Dec 13 14:08:05.014220 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Dec 13 14:08:05.014226 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:08:05.014233 kernel: LSM: Security Framework initializing Dec 13 14:08:05.014239 kernel: SELinux: Initializing. Dec 13 14:08:05.014246 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:08:05.014252 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:08:05.014259 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Dec 13 14:08:05.014267 kernel: Hyper-V: Host Build 10.0.22477.1594-1-0 Dec 13 14:08:05.014273 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:08:05.014280 kernel: Remapping and enabling EFI services. Dec 13 14:08:05.014286 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:08:05.014293 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:08:05.014299 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Dec 13 14:08:05.014306 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:08:05.014313 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Dec 13 14:08:05.014319 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:08:05.014326 kernel: SMP: Total of 2 processors activated. Dec 13 14:08:05.014333 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:08:05.014340 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Dec 13 14:08:05.014347 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Dec 13 14:08:05.014353 kernel: CPU features: detected: CRC32 instructions Dec 13 14:08:05.014360 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Dec 13 14:08:05.014366 kernel: CPU features: detected: LSE atomic instructions Dec 13 14:08:05.014373 kernel: CPU features: detected: Privileged Access Never Dec 13 14:08:05.014379 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:08:05.014386 kernel: alternatives: patching kernel code Dec 13 14:08:05.014393 kernel: devtmpfs: initialized Dec 13 14:08:05.014404 kernel: KASLR enabled Dec 13 14:08:05.014411 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:08:05.014419 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:08:05.014426 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:08:05.014433 kernel: SMBIOS 3.1.0 present. Dec 13 14:08:05.014440 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Dec 13 14:08:05.014447 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:08:05.014454 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:08:05.014462 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:08:05.014469 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:08:05.014476 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:08:05.014483 kernel: audit: type=2000 audit(0.091:1): state=initialized audit_enabled=0 res=1 Dec 13 14:08:05.014489 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:08:05.014496 kernel: cpuidle: using governor menu Dec 13 14:08:05.014503 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:08:05.014511 kernel: ASID allocator initialised with 32768 entries Dec 13 14:08:05.014518 kernel: ACPI: bus type PCI registered Dec 13 14:08:05.014525 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:08:05.014532 kernel: Serial: AMBA PL011 UART driver Dec 13 14:08:05.014539 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:08:05.014546 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:08:05.014553 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:08:05.014559 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:08:05.014566 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:08:05.014574 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:08:05.014581 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:08:05.014588 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:08:05.014595 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:08:05.014602 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:08:05.014608 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:08:05.014615 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:08:05.014622 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:08:05.014629 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:08:05.014637 kernel: ACPI: Interpreter enabled Dec 13 14:08:05.014644 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:08:05.014651 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Dec 13 14:08:05.014658 kernel: printk: console [ttyAMA0] enabled Dec 13 14:08:05.014664 kernel: printk: bootconsole [pl11] disabled Dec 13 14:08:05.014671 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Dec 13 14:08:05.014678 kernel: iommu: Default domain type: Translated Dec 13 14:08:05.014685 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:08:05.014692 kernel: vgaarb: loaded Dec 13 14:08:05.014699 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:08:05.014707 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:08:05.014714 kernel: PTP clock support registered Dec 13 14:08:05.014721 kernel: Registered efivars operations Dec 13 14:08:05.014728 kernel: No ACPI PMU IRQ for CPU0 Dec 13 14:08:05.014734 kernel: No ACPI PMU IRQ for CPU1 Dec 13 14:08:05.014741 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:08:05.014748 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:08:05.014755 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:08:05.021791 kernel: pnp: PnP ACPI init Dec 13 14:08:05.021807 kernel: pnp: PnP ACPI: found 0 devices Dec 13 14:08:05.021815 kernel: NET: Registered PF_INET protocol family Dec 13 14:08:05.021822 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:08:05.021829 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:08:05.021839 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:08:05.021846 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:08:05.021854 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:08:05.021861 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:08:05.021871 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:08:05.021881 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:08:05.021888 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:08:05.021895 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:08:05.021902 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Dec 13 14:08:05.021909 kernel: kvm [1]: HYP mode not available Dec 13 14:08:05.021916 kernel: Initialise system trusted keyrings Dec 13 14:08:05.021923 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:08:05.021932 kernel: Key type asymmetric registered Dec 13 14:08:05.021940 kernel: Asymmetric key parser 'x509' registered Dec 13 14:08:05.021947 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:08:05.021954 kernel: io scheduler mq-deadline registered Dec 13 14:08:05.021961 kernel: io scheduler kyber registered Dec 13 14:08:05.021968 kernel: io scheduler bfq registered Dec 13 14:08:05.021975 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:08:05.021984 kernel: thunder_xcv, ver 1.0 Dec 13 14:08:05.021991 kernel: thunder_bgx, ver 1.0 Dec 13 14:08:05.021998 kernel: nicpf, ver 1.0 Dec 13 14:08:05.022005 kernel: nicvf, ver 1.0 Dec 13 14:08:05.022137 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:08:05.022205 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:08:04 UTC (1734098884) Dec 13 14:08:05.022218 kernel: efifb: probing for efifb Dec 13 14:08:05.022226 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:08:05.022234 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:08:05.022241 kernel: efifb: scrolling: redraw Dec 13 14:08:05.022248 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:08:05.022257 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:08:05.022264 kernel: fb0: EFI VGA frame buffer device Dec 13 14:08:05.022273 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Dec 13 14:08:05.022280 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:08:05.022287 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:08:05.022294 kernel: Segment Routing with IPv6 Dec 13 14:08:05.022301 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:08:05.022308 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:08:05.022317 kernel: Key type dns_resolver registered Dec 13 14:08:05.022324 kernel: registered taskstats version 1 Dec 13 14:08:05.022332 kernel: Loading compiled-in X.509 certificates Dec 13 14:08:05.022339 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:08:05.022346 kernel: Key type .fscrypt registered Dec 13 14:08:05.022355 kernel: Key type fscrypt-provisioning registered Dec 13 14:08:05.022364 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:08:05.022371 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:08:05.022378 kernel: ima: No architecture policies found Dec 13 14:08:05.022385 kernel: clk: Disabling unused clocks Dec 13 14:08:05.022393 kernel: Freeing unused kernel memory: 36416K Dec 13 14:08:05.022403 kernel: Run /init as init process Dec 13 14:08:05.022410 kernel: with arguments: Dec 13 14:08:05.022416 kernel: /init Dec 13 14:08:05.022423 kernel: with environment: Dec 13 14:08:05.022429 kernel: HOME=/ Dec 13 14:08:05.022436 kernel: TERM=linux Dec 13 14:08:05.022445 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:08:05.022454 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:08:05.022465 systemd[1]: Detected virtualization microsoft. Dec 13 14:08:05.022473 systemd[1]: Detected architecture arm64. Dec 13 14:08:05.022480 systemd[1]: Running in initrd. Dec 13 14:08:05.022490 systemd[1]: No hostname configured, using default hostname. Dec 13 14:08:05.022497 systemd[1]: Hostname set to . Dec 13 14:08:05.022505 systemd[1]: Initializing machine ID from random generator. Dec 13 14:08:05.022512 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:08:05.022521 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:08:05.022531 systemd[1]: Reached target cryptsetup.target. Dec 13 14:08:05.022538 systemd[1]: Reached target paths.target. Dec 13 14:08:05.022545 systemd[1]: Reached target slices.target. Dec 13 14:08:05.022553 systemd[1]: Reached target swap.target. Dec 13 14:08:05.022560 systemd[1]: Reached target timers.target. Dec 13 14:08:05.022568 systemd[1]: Listening on iscsid.socket. Dec 13 14:08:05.022578 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:08:05.022587 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:08:05.022594 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:08:05.022602 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:08:05.022609 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:08:05.022617 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:08:05.022627 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:08:05.022634 systemd[1]: Reached target sockets.target. Dec 13 14:08:05.022642 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:08:05.022649 systemd[1]: Finished network-cleanup.service. Dec 13 14:08:05.022658 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:08:05.022665 systemd[1]: Starting systemd-journald.service... Dec 13 14:08:05.022675 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:08:05.022682 systemd[1]: Starting systemd-resolved.service... Dec 13 14:08:05.022690 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:08:05.022700 systemd-journald[276]: Journal started Dec 13 14:08:05.022746 systemd-journald[276]: Runtime Journal (/run/log/journal/67f2f07100c143bb8509a2eacf387001) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:08:05.009006 systemd-modules-load[277]: Inserted module 'overlay' Dec 13 14:08:05.048786 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:08:05.048829 systemd[1]: Started systemd-journald.service. Dec 13 14:08:05.060592 kernel: Bridge firewalling registered Dec 13 14:08:05.060703 systemd-modules-load[277]: Inserted module 'br_netfilter' Dec 13 14:08:05.095016 kernel: audit: type=1130 audit(1734098885.060:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.095038 kernel: SCSI subsystem initialized Dec 13 14:08:05.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.082993 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:08:05.084324 systemd-resolved[278]: Positive Trust Anchors: Dec 13 14:08:05.084330 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:08:05.147667 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:08:05.147693 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:08:05.147702 kernel: audit: type=1130 audit(1734098885.125:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.084358 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:08:05.086427 systemd-resolved[278]: Defaulting to hostname 'linux'. Dec 13 14:08:05.218040 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:08:05.218063 kernel: audit: type=1130 audit(1734098885.190:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.126032 systemd[1]: Started systemd-resolved.service. Dec 13 14:08:05.238687 kernel: audit: type=1130 audit(1734098885.217:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.191188 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:08:05.266884 kernel: audit: type=1130 audit(1734098885.243:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.218423 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:08:05.243780 systemd[1]: Reached target nss-lookup.target. Dec 13 14:08:05.268732 systemd-modules-load[277]: Inserted module 'dm_multipath' Dec 13 14:08:05.273953 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:08:05.325853 kernel: audit: type=1130 audit(1734098885.299:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.283179 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:08:05.353121 kernel: audit: type=1130 audit(1734098885.326:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.294393 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:08:05.316019 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:08:05.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.327864 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:08:05.353747 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:08:05.414464 kernel: audit: type=1130 audit(1734098885.362:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.414489 kernel: audit: type=1130 audit(1734098885.393:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.385524 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:08:05.410931 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:08:05.432761 dracut-cmdline[299]: dracut-dracut-053 Dec 13 14:08:05.438275 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:08:05.502789 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:08:05.517784 kernel: iscsi: registered transport (tcp) Dec 13 14:08:05.538749 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:08:05.538821 kernel: QLogic iSCSI HBA Driver Dec 13 14:08:05.573646 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:08:05.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:05.579385 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:08:05.632790 kernel: raid6: neonx8 gen() 13841 MB/s Dec 13 14:08:05.651784 kernel: raid6: neonx8 xor() 10844 MB/s Dec 13 14:08:05.671773 kernel: raid6: neonx4 gen() 13551 MB/s Dec 13 14:08:05.692774 kernel: raid6: neonx4 xor() 11197 MB/s Dec 13 14:08:05.712772 kernel: raid6: neonx2 gen() 12988 MB/s Dec 13 14:08:05.732773 kernel: raid6: neonx2 xor() 10417 MB/s Dec 13 14:08:05.754777 kernel: raid6: neonx1 gen() 10548 MB/s Dec 13 14:08:05.774772 kernel: raid6: neonx1 xor() 8802 MB/s Dec 13 14:08:05.794776 kernel: raid6: int64x8 gen() 6276 MB/s Dec 13 14:08:05.820773 kernel: raid6: int64x8 xor() 3540 MB/s Dec 13 14:08:05.840771 kernel: raid6: int64x4 gen() 7217 MB/s Dec 13 14:08:05.870772 kernel: raid6: int64x4 xor() 3861 MB/s Dec 13 14:08:05.891773 kernel: raid6: int64x2 gen() 6152 MB/s Dec 13 14:08:05.911772 kernel: raid6: int64x2 xor() 3322 MB/s Dec 13 14:08:05.931776 kernel: raid6: int64x1 gen() 5050 MB/s Dec 13 14:08:05.955880 kernel: raid6: int64x1 xor() 2655 MB/s Dec 13 14:08:05.955899 kernel: raid6: using algorithm neonx8 gen() 13841 MB/s Dec 13 14:08:05.955916 kernel: raid6: .... xor() 10844 MB/s, rmw enabled Dec 13 14:08:05.959852 kernel: raid6: using neon recovery algorithm Dec 13 14:08:05.981950 kernel: xor: measuring software checksum speed Dec 13 14:08:05.981963 kernel: 8regs : 17188 MB/sec Dec 13 14:08:05.985926 kernel: 32regs : 20655 MB/sec Dec 13 14:08:05.989776 kernel: arm64_neon : 27936 MB/sec Dec 13 14:08:05.989785 kernel: xor: using function: arm64_neon (27936 MB/sec) Dec 13 14:08:06.050781 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:08:06.060116 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:08:06.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:06.067000 audit: BPF prog-id=7 op=LOAD Dec 13 14:08:06.068000 audit: BPF prog-id=8 op=LOAD Dec 13 14:08:06.069260 systemd[1]: Starting systemd-udevd.service... Dec 13 14:08:06.087245 systemd-udevd[476]: Using default interface naming scheme 'v252'. Dec 13 14:08:06.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:06.094339 systemd[1]: Started systemd-udevd.service. Dec 13 14:08:06.106567 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:08:06.117107 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Dec 13 14:08:06.146121 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:08:06.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:06.151675 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:08:06.196759 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:08:06.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:06.245587 kernel: hv_vmbus: Vmbus version:5.3 Dec 13 14:08:06.263784 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:08:06.263837 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:08:06.284365 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 14:08:06.284418 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:08:06.289948 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:08:06.298425 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 14:08:06.309114 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:08:06.313222 kernel: scsi host0: storvsc_host_t Dec 13 14:08:06.313794 kernel: scsi host1: storvsc_host_t Dec 13 14:08:06.324915 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:08:06.332280 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:08:06.353832 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:08:06.354728 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:08:06.354742 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:08:06.371602 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:08:06.394797 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:08:06.394909 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:08:06.394995 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:08:06.395077 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:08:06.395164 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:08:06.395174 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:08:06.414795 kernel: hv_netvsc 002248c0-c6ea-0022-48c0-c6ea002248c0 eth0: VF slot 1 added Dec 13 14:08:06.424788 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:08:06.438104 kernel: hv_pci 5e4438cb-dbdb-45b5-a788-5b32b22ac134: PCI VMBus probing: Using version 0x10004 Dec 13 14:08:06.539118 kernel: hv_pci 5e4438cb-dbdb-45b5-a788-5b32b22ac134: PCI host bridge to bus dbdb:00 Dec 13 14:08:06.539214 kernel: pci_bus dbdb:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Dec 13 14:08:06.539316 kernel: pci_bus dbdb:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:08:06.539392 kernel: pci dbdb:00:02.0: [15b3:1018] type 00 class 0x020000 Dec 13 14:08:06.539489 kernel: pci dbdb:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:08:06.539572 kernel: pci dbdb:00:02.0: enabling Extended Tags Dec 13 14:08:06.539657 kernel: pci dbdb:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at dbdb:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Dec 13 14:08:06.539744 kernel: pci_bus dbdb:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:08:06.539852 kernel: pci dbdb:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:08:06.577797 kernel: mlx5_core dbdb:00:02.0: firmware version: 16.30.1284 Dec 13 14:08:06.795261 kernel: mlx5_core dbdb:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Dec 13 14:08:06.795409 kernel: hv_netvsc 002248c0-c6ea-0022-48c0-c6ea002248c0 eth0: VF registering: eth1 Dec 13 14:08:06.795505 kernel: mlx5_core dbdb:00:02.0 eth1: joined to eth0 Dec 13 14:08:06.802786 kernel: mlx5_core dbdb:00:02.0 enP56283s1: renamed from eth1 Dec 13 14:08:06.925077 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:08:06.980788 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (535) Dec 13 14:08:06.993738 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:08:07.168712 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:08:07.208144 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:08:07.219720 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:08:07.226585 systemd[1]: Starting disk-uuid.service... Dec 13 14:08:08.257477 disk-uuid[601]: The operation has completed successfully. Dec 13 14:08:08.263104 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:08:08.316370 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:08:08.317996 systemd[1]: Finished disk-uuid.service. Dec 13 14:08:08.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.331852 systemd[1]: Starting verity-setup.service... Dec 13 14:08:08.378800 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:08:08.643864 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:08:08.649189 systemd[1]: Finished verity-setup.service. Dec 13 14:08:08.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.658467 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:08:08.718677 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:08:08.725939 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:08:08.722668 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:08:08.723404 systemd[1]: Starting ignition-setup.service... Dec 13 14:08:08.738970 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:08:08.766227 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:08:08.766280 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:08:08.766290 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:08:08.807917 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:08:08.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.817000 audit: BPF prog-id=9 op=LOAD Dec 13 14:08:08.818590 systemd[1]: Starting systemd-networkd.service... Dec 13 14:08:08.844289 systemd-networkd[868]: lo: Link UP Dec 13 14:08:08.847788 systemd-networkd[868]: lo: Gained carrier Dec 13 14:08:08.848228 systemd-networkd[868]: Enumeration completed Dec 13 14:08:08.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.848306 systemd[1]: Started systemd-networkd.service. Dec 13 14:08:08.857200 systemd-networkd[868]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:08:08.858053 systemd[1]: Reached target network.target. Dec 13 14:08:08.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.867137 systemd[1]: Starting iscsiuio.service... Dec 13 14:08:08.875635 systemd[1]: Started iscsiuio.service. Dec 13 14:08:08.889886 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:08:08.909597 iscsid[880]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:08:08.909597 iscsid[880]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:08:08.909597 iscsid[880]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:08:08.909597 iscsid[880]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:08:08.909597 iscsid[880]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:08:08.909597 iscsid[880]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:08:08.909597 iscsid[880]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:08:08.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.890914 systemd[1]: Starting iscsid.service... Dec 13 14:08:09.030860 kernel: mlx5_core dbdb:00:02.0 enP56283s1: Link up Dec 13 14:08:09.031034 kernel: kauditd_printk_skb: 15 callbacks suppressed Dec 13 14:08:09.031052 kernel: audit: type=1130 audit(1734098888.988:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.901651 systemd[1]: Started iscsid.service. Dec 13 14:08:09.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:08.914544 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:08:09.071472 kernel: audit: type=1130 audit(1734098889.035:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:09.071494 kernel: hv_netvsc 002248c0-c6ea-0022-48c0-c6ea002248c0 eth0: Data path switched to VF: enP56283s1 Dec 13 14:08:08.969273 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:08:09.090721 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:08:09.000185 systemd[1]: Finished ignition-setup.service. Dec 13 14:08:09.035499 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:08:09.067142 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:08:09.076974 systemd-networkd[868]: enP56283s1: Link UP Dec 13 14:08:09.077158 systemd-networkd[868]: eth0: Link UP Dec 13 14:08:09.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:09.082052 systemd[1]: Reached target remote-fs.target. Dec 13 14:08:09.149891 kernel: audit: type=1130 audit(1734098889.125:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:09.082061 systemd-networkd[868]: eth0: Gained carrier Dec 13 14:08:09.087536 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:08:09.096009 systemd-networkd[868]: enP56283s1: Gained carrier Dec 13 14:08:09.103122 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:08:09.106907 systemd-networkd[868]: eth0: DHCPv4 address 10.200.20.19/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:08:09.117531 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:08:10.835889 systemd-networkd[868]: eth0: Gained IPv6LL Dec 13 14:08:12.360312 ignition[896]: Ignition 2.14.0 Dec 13 14:08:12.360324 ignition[896]: Stage: fetch-offline Dec 13 14:08:12.360383 ignition[896]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:08:12.360408 ignition[896]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:08:12.420043 ignition[896]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:08:12.420202 ignition[896]: parsed url from cmdline: "" Dec 13 14:08:12.420206 ignition[896]: no config URL provided Dec 13 14:08:12.420211 ignition[896]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:08:12.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.436339 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:08:12.483155 kernel: audit: type=1130 audit(1734098892.445:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.420219 ignition[896]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:08:12.472666 systemd[1]: Starting ignition-fetch.service... Dec 13 14:08:12.420225 ignition[896]: failed to fetch config: resource requires networking Dec 13 14:08:12.420338 ignition[896]: Ignition finished successfully Dec 13 14:08:12.479213 ignition[902]: Ignition 2.14.0 Dec 13 14:08:12.479219 ignition[902]: Stage: fetch Dec 13 14:08:12.479323 ignition[902]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:08:12.479341 ignition[902]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:08:12.483089 ignition[902]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:08:12.483300 ignition[902]: parsed url from cmdline: "" Dec 13 14:08:12.483304 ignition[902]: no config URL provided Dec 13 14:08:12.483309 ignition[902]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:08:12.483317 ignition[902]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:08:12.483350 ignition[902]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:08:12.605257 ignition[902]: GET result: OK Dec 13 14:08:12.607745 unknown[902]: fetched base config from "system" Dec 13 14:08:12.641847 kernel: audit: type=1130 audit(1734098892.614:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.605310 ignition[902]: config has been read from IMDS userdata Dec 13 14:08:12.607752 unknown[902]: fetched base config from "system" Dec 13 14:08:12.605331 ignition[902]: parsing config with SHA512: 88a36a1f7ae248bd2603101296a6a0f031c9835a6821491c51fc99f574f651cc14e0e00eed22760345e8fa973210b9b39c42c61cf1e4a3463be4d750de8468d2 Dec 13 14:08:12.607757 unknown[902]: fetched user config from "azure" Dec 13 14:08:12.608172 ignition[902]: fetch: fetch complete Dec 13 14:08:12.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.609320 systemd[1]: Finished ignition-fetch.service. Dec 13 14:08:12.693072 kernel: audit: type=1130 audit(1734098892.661:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.608177 ignition[902]: fetch: fetch passed Dec 13 14:08:12.615558 systemd[1]: Starting ignition-kargs.service... Dec 13 14:08:12.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.608216 ignition[902]: Ignition finished successfully Dec 13 14:08:12.657489 systemd[1]: Finished ignition-kargs.service. Dec 13 14:08:12.746164 kernel: audit: type=1130 audit(1734098892.701:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.648444 ignition[908]: Ignition 2.14.0 Dec 13 14:08:12.683633 systemd[1]: Starting ignition-disks.service... Dec 13 14:08:12.648450 ignition[908]: Stage: kargs Dec 13 14:08:12.696850 systemd[1]: Finished ignition-disks.service. Dec 13 14:08:12.648545 ignition[908]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:08:12.701953 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:08:12.648565 ignition[908]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:08:12.730890 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:08:12.652677 ignition[908]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:08:12.740392 systemd[1]: Reached target local-fs.target. Dec 13 14:08:12.653751 ignition[908]: kargs: kargs passed Dec 13 14:08:12.750782 systemd[1]: Reached target sysinit.target. Dec 13 14:08:12.653816 ignition[908]: Ignition finished successfully Dec 13 14:08:12.759702 systemd[1]: Reached target basic.target. Dec 13 14:08:12.690253 ignition[914]: Ignition 2.14.0 Dec 13 14:08:12.840400 systemd-fsck[922]: ROOT: clean, 621/7326000 files, 481076/7359488 blocks Dec 13 14:08:12.770140 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:08:12.690260 ignition[914]: Stage: disks Dec 13 14:08:12.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.850065 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:08:12.885823 kernel: audit: type=1130 audit(1734098892.858:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:12.690357 ignition[914]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:08:12.885105 systemd[1]: Mounting sysroot.mount... Dec 13 14:08:12.690375 ignition[914]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:08:12.693112 ignition[914]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:08:12.694971 ignition[914]: disks: disks passed Dec 13 14:08:12.695040 ignition[914]: Ignition finished successfully Dec 13 14:08:12.927981 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:08:12.924258 systemd[1]: Mounted sysroot.mount. Dec 13 14:08:12.932093 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:08:12.974411 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:08:12.980120 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:08:12.985411 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:08:12.985457 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:08:12.996518 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:08:13.059164 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:08:13.065055 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:08:13.095522 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (933) Dec 13 14:08:13.095572 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:08:13.101380 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:08:13.101489 initrd-setup-root[938]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:08:13.113331 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:08:13.117461 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:08:13.130221 initrd-setup-root[964]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:08:13.156867 initrd-setup-root[972]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:08:13.167332 initrd-setup-root[980]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:08:13.712785 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:08:13.739420 kernel: audit: type=1130 audit(1734098893.717:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:13.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:13.718884 systemd[1]: Starting ignition-mount.service... Dec 13 14:08:13.742229 systemd[1]: Starting sysroot-boot.service... Dec 13 14:08:13.752525 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:08:13.752654 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:08:13.778956 systemd[1]: Finished sysroot-boot.service. Dec 13 14:08:13.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:13.804793 kernel: audit: type=1130 audit(1734098893.783:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:13.933898 ignition[1002]: INFO : Ignition 2.14.0 Dec 13 14:08:13.933898 ignition[1002]: INFO : Stage: mount Dec 13 14:08:13.944982 ignition[1002]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:08:13.944982 ignition[1002]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:08:13.944982 ignition[1002]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:08:13.944982 ignition[1002]: INFO : mount: mount passed Dec 13 14:08:13.944982 ignition[1002]: INFO : Ignition finished successfully Dec 13 14:08:13.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:13.944732 systemd[1]: Finished ignition-mount.service. Dec 13 14:08:14.440193 coreos-metadata[932]: Dec 13 14:08:14.440 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:08:14.451326 coreos-metadata[932]: Dec 13 14:08:14.451 INFO Fetch successful Dec 13 14:08:14.485279 coreos-metadata[932]: Dec 13 14:08:14.485 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:08:14.500156 coreos-metadata[932]: Dec 13 14:08:14.497 INFO Fetch successful Dec 13 14:08:14.516185 coreos-metadata[932]: Dec 13 14:08:14.516 INFO wrote hostname ci-3510.3.6-a-4df065c637 to /sysroot/etc/hostname Dec 13 14:08:14.526449 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:08:14.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:14.533207 systemd[1]: Starting ignition-files.service... Dec 13 14:08:14.569856 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:08:14.569879 kernel: audit: type=1130 audit(1734098894.532:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:14.570672 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:08:14.590793 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1011) Dec 13 14:08:14.607097 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:08:14.607113 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:08:14.607122 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:08:14.617240 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:08:14.635908 ignition[1030]: INFO : Ignition 2.14.0 Dec 13 14:08:14.640231 ignition[1030]: INFO : Stage: files Dec 13 14:08:14.640231 ignition[1030]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:08:14.640231 ignition[1030]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:08:14.666219 ignition[1030]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:08:14.672920 ignition[1030]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:08:14.679051 ignition[1030]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:08:14.679051 ignition[1030]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:08:14.798993 ignition[1030]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:08:14.807039 ignition[1030]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:08:14.816955 unknown[1030]: wrote ssh authorized keys file for user: core Dec 13 14:08:14.822580 ignition[1030]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:08:14.843974 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:08:14.862625 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:08:14.862625 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:08:14.862625 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:08:14.862625 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:08:14.862625 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:08:14.862625 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:08:14.862625 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:08:14.862625 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3758081373" Dec 13 14:08:14.862625 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3758081373": device or resource busy Dec 13 14:08:14.862625 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3758081373", trying btrfs: device or resource busy Dec 13 14:08:14.862625 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3758081373" Dec 13 14:08:15.007034 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1032) Dec 13 14:08:14.885976 systemd[1]: mnt-oem3758081373.mount: Deactivated successfully. Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3758081373" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3758081373" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3758081373" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3546418211" Dec 13 14:08:15.012505 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3546418211": device or resource busy Dec 13 14:08:15.012505 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3546418211", trying btrfs: device or resource busy Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3546418211" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3546418211" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3546418211" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3546418211" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:08:15.012505 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:08:14.928921 systemd[1]: mnt-oem3546418211.mount: Deactivated successfully. Dec 13 14:08:15.189827 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 Dec 13 14:08:15.309927 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 14:08:15.537859 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:08:15.537859 ignition[1030]: INFO : files: op(f): [started] processing unit "waagent.service" Dec 13 14:08:15.537859 ignition[1030]: INFO : files: op(f): [finished] processing unit "waagent.service" Dec 13 14:08:15.537859 ignition[1030]: INFO : files: op(10): [started] processing unit "nvidia.service" Dec 13 14:08:15.537859 ignition[1030]: INFO : files: op(10): [finished] processing unit "nvidia.service" Dec 13 14:08:15.537859 ignition[1030]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Dec 13 14:08:15.613593 kernel: audit: type=1130 audit(1734098895.561:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.613683 ignition[1030]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Dec 13 14:08:15.613683 ignition[1030]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Dec 13 14:08:15.613683 ignition[1030]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:08:15.613683 ignition[1030]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:08:15.613683 ignition[1030]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:08:15.613683 ignition[1030]: INFO : files: files passed Dec 13 14:08:15.613683 ignition[1030]: INFO : Ignition finished successfully Dec 13 14:08:15.747454 kernel: audit: type=1130 audit(1734098895.631:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.747478 kernel: audit: type=1131 audit(1734098895.631:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.747489 kernel: audit: type=1130 audit(1734098895.684:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.551315 systemd[1]: Finished ignition-files.service. Dec 13 14:08:15.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.588431 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:08:15.801395 kernel: audit: type=1130 audit(1734098895.752:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.801423 kernel: audit: type=1131 audit(1734098895.752:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.801436 initrd-setup-root-after-ignition[1056]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:08:15.598582 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:08:15.599443 systemd[1]: Starting ignition-quench.service... Dec 13 14:08:15.618837 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:08:15.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.618944 systemd[1]: Finished ignition-quench.service. Dec 13 14:08:15.679488 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:08:15.874994 kernel: audit: type=1130 audit(1734098895.841:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.685549 systemd[1]: Reached target ignition-complete.target. Dec 13 14:08:15.713022 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:08:15.747391 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:08:15.747503 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:08:15.752646 systemd[1]: Reached target initrd-fs.target. Dec 13 14:08:15.795892 systemd[1]: Reached target initrd.target. Dec 13 14:08:15.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.805716 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:08:15.814101 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:08:15.973127 kernel: audit: type=1131 audit(1734098895.929:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.836250 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:08:15.868972 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:08:15.887220 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:08:15.892737 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:08:15.908841 systemd[1]: Stopped target timers.target. Dec 13 14:08:15.919951 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:08:15.920020 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:08:15.956019 systemd[1]: Stopped target initrd.target. Dec 13 14:08:15.968471 systemd[1]: Stopped target basic.target. Dec 13 14:08:15.977970 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:08:15.989452 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:08:16.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:15.999699 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:08:16.099895 kernel: audit: type=1131 audit(1734098896.072:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.010104 systemd[1]: Stopped target remote-fs.target. Dec 13 14:08:16.019537 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:08:16.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.028608 systemd[1]: Stopped target sysinit.target. Dec 13 14:08:16.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.038130 systemd[1]: Stopped target local-fs.target. Dec 13 14:08:16.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.046837 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:08:16.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.055385 systemd[1]: Stopped target swap.target. Dec 13 14:08:16.063423 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:08:16.063490 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:08:16.169009 ignition[1069]: INFO : Ignition 2.14.0 Dec 13 14:08:16.169009 ignition[1069]: INFO : Stage: umount Dec 13 14:08:16.169009 ignition[1069]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:08:16.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.095006 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:08:16.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.211926 ignition[1069]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:08:16.211926 ignition[1069]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:08:16.211926 ignition[1069]: INFO : umount: umount passed Dec 13 14:08:16.211926 ignition[1069]: INFO : Ignition finished successfully Dec 13 14:08:16.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.104397 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:08:16.104457 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:08:16.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.112978 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:08:16.113017 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:08:16.122673 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:08:16.122718 systemd[1]: Stopped ignition-files.service. Dec 13 14:08:16.130529 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:08:16.130567 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:08:16.145380 systemd[1]: Stopping ignition-mount.service... Dec 13 14:08:16.156457 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:08:16.175233 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:08:16.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.175326 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:08:16.186523 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:08:16.186592 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:08:16.194246 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:08:16.194353 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:08:16.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.206209 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:08:16.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.206303 systemd[1]: Stopped ignition-mount.service. Dec 13 14:08:16.397000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:08:16.216986 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:08:16.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.217298 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:08:16.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.217338 systemd[1]: Stopped ignition-disks.service. Dec 13 14:08:16.232024 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:08:16.232074 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:08:16.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.244122 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:08:16.244174 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:08:16.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.253308 systemd[1]: Stopped target network.target. Dec 13 14:08:16.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.261837 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:08:16.261902 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:08:16.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.272219 systemd[1]: Stopped target paths.target. Dec 13 14:08:16.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.279947 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:08:16.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.295924 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:08:16.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.301062 systemd[1]: Stopped target slices.target. Dec 13 14:08:16.540660 kernel: hv_netvsc 002248c0-c6ea-0022-48c0-c6ea002248c0 eth0: Data path switched from VF: enP56283s1 Dec 13 14:08:16.308600 systemd[1]: Stopped target sockets.target. Dec 13 14:08:16.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.318391 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:08:16.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.318426 systemd[1]: Closed iscsid.socket. Dec 13 14:08:16.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.326326 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:08:16.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.326354 systemd[1]: Closed iscsiuio.socket. Dec 13 14:08:16.333841 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:08:16.333885 systemd[1]: Stopped ignition-setup.service. Dec 13 14:08:16.342529 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:08:16.352232 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:08:16.360817 systemd-networkd[868]: eth0: DHCPv6 lease lost Dec 13 14:08:16.601000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:08:16.365594 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:08:16.365696 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:08:16.380084 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:08:16.380169 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:08:16.388707 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:08:16.388752 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:08:16.398299 systemd[1]: Stopping network-cleanup.service... Dec 13 14:08:16.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:16.405509 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:08:16.405572 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:08:16.410382 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:08:16.410424 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:08:16.425011 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:08:16.425059 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:08:16.438788 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:08:16.447840 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:08:16.448377 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:08:16.448492 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:08:16.460549 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:08:16.719708 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). Dec 13 14:08:16.719740 iscsid[880]: iscsid shutting down. Dec 13 14:08:16.460671 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:08:16.469868 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:08:16.469916 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:08:16.477591 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:08:16.477629 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:08:16.482154 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:08:16.482212 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:08:16.492051 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:08:16.492101 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:08:16.500673 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:08:16.500711 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:08:16.508496 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:08:16.508538 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:08:16.519550 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:08:16.536742 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:08:16.536867 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:08:16.549479 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:08:16.549531 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:08:16.554217 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:08:16.554286 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:08:16.564918 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:08:16.565464 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:08:16.565564 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:08:16.632459 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:08:16.632562 systemd[1]: Stopped network-cleanup.service. Dec 13 14:08:16.641743 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:08:16.651821 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:08:16.669261 systemd[1]: Switching root. Dec 13 14:08:16.720541 systemd-journald[276]: Journal stopped Dec 13 14:08:29.418236 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:08:29.418256 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:08:29.418266 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:08:29.418276 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:08:29.418284 kernel: SELinux: policy capability open_perms=1 Dec 13 14:08:29.418292 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:08:29.418301 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:08:29.418308 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:08:29.418316 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:08:29.418324 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:08:29.418332 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:08:29.418343 systemd[1]: Successfully loaded SELinux policy in 292.951ms. Dec 13 14:08:29.418355 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.134ms. Dec 13 14:08:29.418365 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:08:29.418375 systemd[1]: Detected virtualization microsoft. Dec 13 14:08:29.418385 systemd[1]: Detected architecture arm64. Dec 13 14:08:29.418394 systemd[1]: Detected first boot. Dec 13 14:08:29.418403 systemd[1]: Hostname set to . Dec 13 14:08:29.418412 systemd[1]: Initializing machine ID from random generator. Dec 13 14:08:29.418421 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:08:29.418430 kernel: audit: type=1400 audit(1734098900.072:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:08:29.418439 kernel: audit: type=1400 audit(1734098900.072:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:08:29.418449 kernel: audit: type=1334 audit(1734098900.077:83): prog-id=10 op=LOAD Dec 13 14:08:29.418458 kernel: audit: type=1334 audit(1734098900.077:84): prog-id=10 op=UNLOAD Dec 13 14:08:29.418466 kernel: audit: type=1334 audit(1734098900.094:85): prog-id=11 op=LOAD Dec 13 14:08:29.418475 kernel: audit: type=1334 audit(1734098900.094:86): prog-id=11 op=UNLOAD Dec 13 14:08:29.418484 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:08:29.418493 kernel: audit: type=1400 audit(1734098901.275:87): avc: denied { associate } for pid=1102 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:08:29.418503 kernel: audit: type=1300 audit(1734098901.275:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1085 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.418513 kernel: audit: type=1327 audit(1734098901.275:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:08:29.418523 kernel: audit: type=1400 audit(1734098901.290:88): avc: denied { associate } for pid=1102 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:08:29.418531 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:08:29.418541 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:08:29.418551 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:08:29.418561 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:08:29.418571 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 14:08:29.418580 kernel: audit: type=1334 audit(1734098908.562:89): prog-id=12 op=LOAD Dec 13 14:08:29.418588 kernel: audit: type=1334 audit(1734098908.562:90): prog-id=3 op=UNLOAD Dec 13 14:08:29.418597 kernel: audit: type=1334 audit(1734098908.569:91): prog-id=13 op=LOAD Dec 13 14:08:29.418606 kernel: audit: type=1334 audit(1734098908.575:92): prog-id=14 op=LOAD Dec 13 14:08:29.418616 kernel: audit: type=1334 audit(1734098908.575:93): prog-id=4 op=UNLOAD Dec 13 14:08:29.418625 kernel: audit: type=1334 audit(1734098908.575:94): prog-id=5 op=UNLOAD Dec 13 14:08:29.418634 kernel: audit: type=1334 audit(1734098908.582:95): prog-id=15 op=LOAD Dec 13 14:08:29.418642 kernel: audit: type=1334 audit(1734098908.582:96): prog-id=12 op=UNLOAD Dec 13 14:08:29.418652 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:08:29.418662 kernel: audit: type=1334 audit(1734098908.588:97): prog-id=16 op=LOAD Dec 13 14:08:29.418671 systemd[1]: Stopped iscsiuio.service. Dec 13 14:08:29.418680 kernel: audit: type=1334 audit(1734098908.595:98): prog-id=17 op=LOAD Dec 13 14:08:29.418689 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:08:29.418698 systemd[1]: Stopped iscsid.service. Dec 13 14:08:29.418707 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:08:29.418718 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:08:29.418728 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:08:29.418737 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:08:29.418747 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:08:29.418757 systemd[1]: Created slice system-getty.slice. Dec 13 14:08:29.418776 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:08:29.418786 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:08:29.418796 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:08:29.418805 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:08:29.418816 systemd[1]: Created slice user.slice. Dec 13 14:08:29.418825 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:08:29.418834 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:08:29.418843 systemd[1]: Set up automount boot.automount. Dec 13 14:08:29.418852 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:08:29.418861 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:08:29.418871 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:08:29.418880 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:08:29.418891 systemd[1]: Reached target integritysetup.target. Dec 13 14:08:29.418900 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:08:29.418909 systemd[1]: Reached target remote-fs.target. Dec 13 14:08:29.418919 systemd[1]: Reached target slices.target. Dec 13 14:08:29.418928 systemd[1]: Reached target swap.target. Dec 13 14:08:29.418937 systemd[1]: Reached target torcx.target. Dec 13 14:08:29.418948 systemd[1]: Reached target veritysetup.target. Dec 13 14:08:29.418958 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:08:29.418968 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:08:29.418978 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:08:29.418987 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:08:29.418996 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:08:29.419005 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:08:29.419016 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:08:29.419025 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:08:29.419034 systemd[1]: Mounting media.mount... Dec 13 14:08:29.419044 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:08:29.419053 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:08:29.419063 systemd[1]: Mounting tmp.mount... Dec 13 14:08:29.419072 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:08:29.419082 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:08:29.419092 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:08:29.419102 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:08:29.419111 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:08:29.419121 systemd[1]: Starting modprobe@drm.service... Dec 13 14:08:29.419130 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:08:29.419139 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:08:29.419149 systemd[1]: Starting modprobe@loop.service... Dec 13 14:08:29.419160 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:08:29.419170 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:08:29.419179 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:08:29.419189 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:08:29.419199 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:08:29.419209 systemd[1]: Stopped systemd-journald.service. Dec 13 14:08:29.419218 systemd[1]: systemd-journald.service: Consumed 3.078s CPU time. Dec 13 14:08:29.419228 systemd[1]: Starting systemd-journald.service... Dec 13 14:08:29.419237 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:08:29.419246 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:08:29.419256 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:08:29.419264 kernel: loop: module loaded Dec 13 14:08:29.419275 kernel: fuse: init (API version 7.34) Dec 13 14:08:29.419284 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:08:29.419293 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:08:29.419302 systemd[1]: Stopped verity-setup.service. Dec 13 14:08:29.419311 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:08:29.419320 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:08:29.419330 systemd[1]: Mounted media.mount. Dec 13 14:08:29.419339 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:08:29.419349 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:08:29.419360 systemd[1]: Mounted tmp.mount. Dec 13 14:08:29.419373 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:08:29.419383 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:08:29.419393 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:08:29.419403 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:08:29.419412 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:08:29.419422 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:08:29.419431 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:08:29.419443 systemd-journald[1208]: Journal started Dec 13 14:08:29.419480 systemd-journald[1208]: Runtime Journal (/run/log/journal/645f1c62029b4b24a953573dd4cc3f76) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:08:19.256000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:08:20.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:08:20.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:08:20.077000 audit: BPF prog-id=10 op=LOAD Dec 13 14:08:20.077000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:08:20.094000 audit: BPF prog-id=11 op=LOAD Dec 13 14:08:20.094000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:08:21.275000 audit[1102]: AVC avc: denied { associate } for pid=1102 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:08:21.275000 audit[1102]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1085 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:21.275000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:08:21.290000 audit[1102]: AVC avc: denied { associate } for pid=1102 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:08:21.290000 audit[1102]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022105 a2=1ed a3=0 items=2 ppid=1085 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:21.290000 audit: CWD cwd="/" Dec 13 14:08:21.290000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:21.290000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:21.290000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:08:28.562000 audit: BPF prog-id=12 op=LOAD Dec 13 14:08:28.562000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:08:28.569000 audit: BPF prog-id=13 op=LOAD Dec 13 14:08:28.575000 audit: BPF prog-id=14 op=LOAD Dec 13 14:08:28.575000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:08:28.575000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:08:28.582000 audit: BPF prog-id=15 op=LOAD Dec 13 14:08:28.582000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:08:28.588000 audit: BPF prog-id=16 op=LOAD Dec 13 14:08:28.595000 audit: BPF prog-id=17 op=LOAD Dec 13 14:08:28.595000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:08:28.595000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:08:28.601000 audit: BPF prog-id=18 op=LOAD Dec 13 14:08:28.601000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:08:28.607000 audit: BPF prog-id=19 op=LOAD Dec 13 14:08:28.613000 audit: BPF prog-id=20 op=LOAD Dec 13 14:08:28.613000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:08:28.613000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:08:28.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:28.640000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:08:28.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:28.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:28.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:28.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.217000 audit: BPF prog-id=21 op=LOAD Dec 13 14:08:29.217000 audit: BPF prog-id=22 op=LOAD Dec 13 14:08:29.217000 audit: BPF prog-id=23 op=LOAD Dec 13 14:08:29.217000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:08:29.217000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:08:29.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.415000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:08:29.415000 audit[1208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffc558ebb0 a2=4000 a3=1 items=0 ppid=1 pid=1208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.415000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:08:29.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:28.561417 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:08:21.242033 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:08:28.615358 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:08:21.242317 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:08:28.615732 systemd[1]: systemd-journald.service: Consumed 3.078s CPU time. Dec 13 14:08:21.242334 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:08:21.242370 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:08:21.242379 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:08:21.242409 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:08:21.242420 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:08:21.242613 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:08:21.242643 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:08:21.242655 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:08:21.260827 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:08:21.260863 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:08:21.260882 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:08:21.260896 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:08:21.260912 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:08:21.260926 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:08:27.365567 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:08:27.365842 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:08:27.365939 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:08:27.366104 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:08:27.366156 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:08:27.366211 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-12-13T14:08:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:08:29.427052 systemd[1]: Finished modprobe@drm.service. Dec 13 14:08:29.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.441482 systemd[1]: Started systemd-journald.service. Dec 13 14:08:29.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.442302 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:08:29.442435 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:08:29.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.447907 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:08:29.448023 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:08:29.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.453197 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:08:29.453315 systemd[1]: Finished modprobe@loop.service. Dec 13 14:08:29.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.458562 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:08:29.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.464299 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:08:29.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.470316 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:08:29.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.475789 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:08:29.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.481601 systemd[1]: Reached target network-pre.target. Dec 13 14:08:29.487583 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:08:29.492973 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:08:29.497548 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:08:29.499173 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:08:29.504618 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:08:29.509037 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:08:29.509992 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:08:29.514682 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:08:29.515773 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:08:29.521217 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:08:29.526708 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:08:29.533726 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:08:29.539458 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:08:29.549675 udevadm[1222]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:08:29.558418 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:08:29.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.563973 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:08:29.589621 systemd-journald[1208]: Time spent on flushing to /var/log/journal/645f1c62029b4b24a953573dd4cc3f76 is 15.810ms for 1094 entries. Dec 13 14:08:29.589621 systemd-journald[1208]: System Journal (/var/log/journal/645f1c62029b4b24a953573dd4cc3f76) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:08:29.654906 systemd-journald[1208]: Received client request to flush runtime journal. Dec 13 14:08:29.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:29.601545 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:08:29.655830 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:08:29.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:30.103224 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:08:30.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:30.109623 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:08:30.442866 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:08:30.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:30.696825 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:08:30.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:30.701000 audit: BPF prog-id=24 op=LOAD Dec 13 14:08:30.701000 audit: BPF prog-id=25 op=LOAD Dec 13 14:08:30.701000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:08:30.701000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:08:30.702980 systemd[1]: Starting systemd-udevd.service... Dec 13 14:08:30.720629 systemd-udevd[1227]: Using default interface naming scheme 'v252'. Dec 13 14:08:30.864879 systemd[1]: Started systemd-udevd.service. Dec 13 14:08:30.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:30.869000 audit: BPF prog-id=26 op=LOAD Dec 13 14:08:30.872560 systemd[1]: Starting systemd-networkd.service... Dec 13 14:08:30.906143 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Dec 13 14:08:30.945000 audit: BPF prog-id=27 op=LOAD Dec 13 14:08:30.945000 audit: BPF prog-id=28 op=LOAD Dec 13 14:08:30.945000 audit: BPF prog-id=29 op=LOAD Dec 13 14:08:30.946887 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:08:30.977000 audit[1234]: AVC avc: denied { confidentiality } for pid=1234 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:08:30.991820 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:08:31.004235 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:08:31.004320 kernel: hv_balloon: Memory hot add disabled on ARM64 Dec 13 14:08:30.977000 audit[1234]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaabb6cefc0 a1=aa2c a2=ffff8e5024b0 a3=aaaabb62f010 items=12 ppid=1227 pid=1234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:30.977000 audit: CWD cwd="/" Dec 13 14:08:30.977000 audit: PATH item=0 name=(null) inode=6706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=1 name=(null) inode=11060 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=2 name=(null) inode=11060 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=3 name=(null) inode=11061 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=4 name=(null) inode=11060 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=5 name=(null) inode=11062 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=6 name=(null) inode=11060 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=7 name=(null) inode=11063 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=8 name=(null) inode=11060 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=9 name=(null) inode=11064 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=10 name=(null) inode=11060 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PATH item=11 name=(null) inode=11065 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:30.977000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:08:31.024677 systemd[1]: Started systemd-userdbd.service. Dec 13 14:08:31.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:31.041987 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:08:31.042052 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:08:31.044783 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:08:31.051272 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:08:31.056701 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:08:31.056753 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:08:31.062899 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:08:30.986595 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:08:31.074955 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:08:31.074981 systemd-journald[1208]: Time jumped backwards, rotating. Dec 13 14:08:31.075036 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:08:31.075050 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:08:31.266486 systemd-networkd[1233]: lo: Link UP Dec 13 14:08:31.266740 systemd-networkd[1233]: lo: Gained carrier Dec 13 14:08:31.267216 systemd-networkd[1233]: Enumeration completed Dec 13 14:08:31.267363 systemd[1]: Started systemd-networkd.service. Dec 13 14:08:31.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:31.273163 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:08:31.296408 systemd-networkd[1233]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:08:31.310766 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1243) Dec 13 14:08:31.327035 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:08:31.336040 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:08:31.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:31.342669 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:08:31.366662 kernel: mlx5_core dbdb:00:02.0 enP56283s1: Link up Dec 13 14:08:31.394441 systemd-networkd[1233]: enP56283s1: Link UP Dec 13 14:08:31.394667 kernel: hv_netvsc 002248c0-c6ea-0022-48c0-c6ea002248c0 eth0: Data path switched to VF: enP56283s1 Dec 13 14:08:31.394897 systemd-networkd[1233]: eth0: Link UP Dec 13 14:08:31.394951 systemd-networkd[1233]: eth0: Gained carrier Dec 13 14:08:31.399894 systemd-networkd[1233]: enP56283s1: Gained carrier Dec 13 14:08:31.410438 systemd-networkd[1233]: eth0: DHCPv4 address 10.200.20.19/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:08:31.636689 lvm[1306]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:08:31.659561 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:08:31.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:31.665148 systemd[1]: Reached target cryptsetup.target. Dec 13 14:08:31.671456 systemd[1]: Starting lvm2-activation.service... Dec 13 14:08:31.675585 lvm[1307]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:08:31.701595 systemd[1]: Finished lvm2-activation.service. Dec 13 14:08:31.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:31.706471 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:08:31.711070 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:08:31.711100 systemd[1]: Reached target local-fs.target. Dec 13 14:08:31.715343 systemd[1]: Reached target machines.target. Dec 13 14:08:31.721326 systemd[1]: Starting ldconfig.service... Dec 13 14:08:31.725046 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:08:31.725115 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:08:31.726260 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:08:31.731887 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:08:31.738945 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:08:31.746064 systemd[1]: Starting systemd-sysext.service... Dec 13 14:08:31.779762 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1309 (bootctl) Dec 13 14:08:31.781178 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:08:32.008454 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:08:32.065725 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:08:32.066694 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:08:32.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.076822 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:08:32.076996 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:08:32.128672 kernel: loop0: detected capacity change from 0 to 194096 Dec 13 14:08:32.136337 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:08:32.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.171664 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:08:32.187713 kernel: loop1: detected capacity change from 0 to 194096 Dec 13 14:08:32.190598 (sd-sysext)[1322]: Using extensions 'kubernetes'. Dec 13 14:08:32.191638 (sd-sysext)[1322]: Merged extensions into '/usr'. Dec 13 14:08:32.206987 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:08:32.211098 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.212258 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:08:32.217381 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:08:32.223578 systemd[1]: Starting modprobe@loop.service... Dec 13 14:08:32.228436 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.228572 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:08:32.230935 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:08:32.235551 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:08:32.235747 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:08:32.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.241000 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:08:32.241125 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:08:32.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.247743 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:08:32.247863 systemd[1]: Finished modprobe@loop.service. Dec 13 14:08:32.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.253417 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:08:32.253515 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.254457 systemd[1]: Finished systemd-sysext.service. Dec 13 14:08:32.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.260804 systemd[1]: Starting ensure-sysext.service... Dec 13 14:08:32.266231 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:08:32.276482 systemd[1]: Reloading. Dec 13 14:08:32.279840 systemd-tmpfiles[1329]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:08:32.298137 systemd-tmpfiles[1329]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:08:32.314186 systemd-fsck[1321]: fsck.fat 4.2 (2021-01-31) Dec 13 14:08:32.314186 systemd-fsck[1321]: /dev/sda1: 236 files, 117175/258078 clusters Dec 13 14:08:32.316987 systemd-tmpfiles[1329]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:08:32.344784 /usr/lib/systemd/system-generators/torcx-generator[1349]: time="2024-12-13T14:08:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:08:32.345078 /usr/lib/systemd/system-generators/torcx-generator[1349]: time="2024-12-13T14:08:32Z" level=info msg="torcx already run" Dec 13 14:08:32.407997 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:08:32.408017 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:08:32.423771 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:08:32.484000 audit: BPF prog-id=30 op=LOAD Dec 13 14:08:32.484000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:08:32.484000 audit: BPF prog-id=31 op=LOAD Dec 13 14:08:32.484000 audit: BPF prog-id=32 op=LOAD Dec 13 14:08:32.484000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:08:32.484000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:08:32.485000 audit: BPF prog-id=33 op=LOAD Dec 13 14:08:32.485000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:08:32.485000 audit: BPF prog-id=34 op=LOAD Dec 13 14:08:32.485000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:08:32.485000 audit: BPF prog-id=35 op=LOAD Dec 13 14:08:32.485000 audit: BPF prog-id=36 op=LOAD Dec 13 14:08:32.486000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:08:32.486000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:08:32.486000 audit: BPF prog-id=37 op=LOAD Dec 13 14:08:32.486000 audit: BPF prog-id=38 op=LOAD Dec 13 14:08:32.486000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:08:32.486000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:08:32.491092 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:08:32.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.502707 systemd[1]: Mounting boot.mount... Dec 13 14:08:32.510088 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.511340 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:08:32.516785 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:08:32.522202 systemd[1]: Starting modprobe@loop.service... Dec 13 14:08:32.526401 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.526533 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:08:32.528778 systemd[1]: Mounted boot.mount. Dec 13 14:08:32.533147 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:08:32.533305 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:08:32.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.538539 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:08:32.538664 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:08:32.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.544231 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:08:32.544344 systemd[1]: Finished modprobe@loop.service. Dec 13 14:08:32.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.549308 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:08:32.549427 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.550799 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.552223 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:08:32.557435 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:08:32.562953 systemd[1]: Starting modprobe@loop.service... Dec 13 14:08:32.566755 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.566878 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:08:32.567731 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:08:32.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.572862 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:08:32.572984 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:08:32.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.577964 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:08:32.578082 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:08:32.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.583002 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:08:32.583117 systemd[1]: Finished modprobe@loop.service. Dec 13 14:08:32.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.587684 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:08:32.587776 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.590131 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.591321 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:08:32.596388 systemd[1]: Starting modprobe@drm.service... Dec 13 14:08:32.601494 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:08:32.607223 systemd[1]: Starting modprobe@loop.service... Dec 13 14:08:32.611040 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.611163 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:08:32.612100 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:08:32.612233 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:08:32.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.616989 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:08:32.617108 systemd[1]: Finished modprobe@drm.service. Dec 13 14:08:32.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.622029 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:08:32.622143 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:08:32.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.627227 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:08:32.627344 systemd[1]: Finished modprobe@loop.service. Dec 13 14:08:32.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.632254 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:08:32.632343 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:08:32.633545 systemd[1]: Finished ensure-sysext.service. Dec 13 14:08:32.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.832635 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:08:32.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.838957 systemd[1]: Starting audit-rules.service... Dec 13 14:08:32.843889 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:08:32.849130 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:08:32.853000 audit: BPF prog-id=39 op=LOAD Dec 13 14:08:32.855679 systemd[1]: Starting systemd-resolved.service... Dec 13 14:08:32.859000 audit: BPF prog-id=40 op=LOAD Dec 13 14:08:32.861605 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:08:32.866751 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:08:32.905000 audit[1429]: SYSTEM_BOOT pid=1429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.910079 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:08:32.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.928944 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:08:32.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.934252 systemd[1]: Reached target time-set.target. Dec 13 14:08:32.978244 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:08:32.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:32.983616 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:08:33.007972 systemd-resolved[1426]: Positive Trust Anchors: Dec 13 14:08:33.007984 systemd-resolved[1426]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:08:33.008011 systemd-resolved[1426]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:08:33.040153 systemd-resolved[1426]: Using system hostname 'ci-3510.3.6-a-4df065c637'. Dec 13 14:08:33.041604 systemd[1]: Started systemd-resolved.service. Dec 13 14:08:33.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:33.046998 systemd[1]: Reached target network.target. Dec 13 14:08:33.052527 systemd[1]: Reached target nss-lookup.target. Dec 13 14:08:33.198892 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:08:33.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:33.273000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:08:33.273000 audit[1444]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffe382c10 a2=420 a3=0 items=0 ppid=1423 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:33.273000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:08:33.282795 systemd-networkd[1233]: eth0: Gained IPv6LL Dec 13 14:08:33.284359 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:08:33.291096 augenrules[1444]: No rules Dec 13 14:08:33.291420 systemd[1]: Reached target network-online.target. Dec 13 14:08:33.297226 systemd[1]: Finished audit-rules.service. Dec 13 14:08:33.371497 systemd-timesyncd[1428]: Contacted time server 23.131.160.7:123 (0.flatcar.pool.ntp.org). Dec 13 14:08:33.371569 systemd-timesyncd[1428]: Initial clock synchronization to Fri 2024-12-13 14:08:33.423140 UTC. Dec 13 14:08:39.920630 ldconfig[1308]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:08:39.935604 systemd[1]: Finished ldconfig.service. Dec 13 14:08:39.942511 systemd[1]: Starting systemd-update-done.service... Dec 13 14:08:40.007147 systemd[1]: Finished systemd-update-done.service. Dec 13 14:08:40.013225 systemd[1]: Reached target sysinit.target. Dec 13 14:08:40.018641 systemd[1]: Started motdgen.path. Dec 13 14:08:40.023241 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:08:40.030896 systemd[1]: Started logrotate.timer. Dec 13 14:08:40.035859 systemd[1]: Started mdadm.timer. Dec 13 14:08:40.040168 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:08:40.045853 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:08:40.045891 systemd[1]: Reached target paths.target. Dec 13 14:08:40.051083 systemd[1]: Reached target timers.target. Dec 13 14:08:40.056933 systemd[1]: Listening on dbus.socket. Dec 13 14:08:40.062818 systemd[1]: Starting docker.socket... Dec 13 14:08:40.069698 systemd[1]: Listening on sshd.socket. Dec 13 14:08:40.074764 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:08:40.075230 systemd[1]: Listening on docker.socket. Dec 13 14:08:40.080346 systemd[1]: Reached target sockets.target. Dec 13 14:08:40.086617 systemd[1]: Reached target basic.target. Dec 13 14:08:40.092071 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:08:40.092104 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:08:40.093153 systemd[1]: Starting containerd.service... Dec 13 14:08:40.098594 systemd[1]: Starting dbus.service... Dec 13 14:08:40.103487 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:08:40.109968 systemd[1]: Starting extend-filesystems.service... Dec 13 14:08:40.115548 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:08:40.117834 systemd[1]: Starting kubelet.service... Dec 13 14:08:40.123238 systemd[1]: Starting motdgen.service... Dec 13 14:08:40.128525 systemd[1]: Started nvidia.service. Dec 13 14:08:40.137133 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:08:40.143223 systemd[1]: Starting sshd-keygen.service... Dec 13 14:08:40.149962 systemd[1]: Starting systemd-logind.service... Dec 13 14:08:40.154971 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:08:40.155033 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:08:40.155406 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:08:40.156068 systemd[1]: Starting update-engine.service... Dec 13 14:08:40.162541 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:08:40.172505 jq[1471]: true Dec 13 14:08:40.172783 jq[1454]: false Dec 13 14:08:40.173853 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:08:40.174183 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:08:40.203897 extend-filesystems[1455]: Found loop1 Dec 13 14:08:40.211312 extend-filesystems[1455]: Found sda Dec 13 14:08:40.211312 extend-filesystems[1455]: Found sda1 Dec 13 14:08:40.211312 extend-filesystems[1455]: Found sda2 Dec 13 14:08:40.211312 extend-filesystems[1455]: Found sda3 Dec 13 14:08:40.211312 extend-filesystems[1455]: Found usr Dec 13 14:08:40.211312 extend-filesystems[1455]: Found sda4 Dec 13 14:08:40.211312 extend-filesystems[1455]: Found sda6 Dec 13 14:08:40.211312 extend-filesystems[1455]: Found sda7 Dec 13 14:08:40.211312 extend-filesystems[1455]: Found sda9 Dec 13 14:08:40.211312 extend-filesystems[1455]: Checking size of /dev/sda9 Dec 13 14:08:40.216130 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:08:40.291578 jq[1475]: true Dec 13 14:08:40.216311 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:08:40.267510 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:08:40.267693 systemd[1]: Finished motdgen.service. Dec 13 14:08:40.309183 systemd-logind[1464]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:08:40.311744 systemd-logind[1464]: New seat seat0. Dec 13 14:08:40.335938 extend-filesystems[1455]: Old size kept for /dev/sda9 Dec 13 14:08:40.351317 extend-filesystems[1455]: Found sr0 Dec 13 14:08:40.342165 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:08:40.342324 systemd[1]: Finished extend-filesystems.service. Dec 13 14:08:40.379492 env[1478]: time="2024-12-13T14:08:40.379427100Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:08:40.440326 bash[1504]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:08:40.447597 env[1478]: time="2024-12-13T14:08:40.444738565Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:08:40.447597 env[1478]: time="2024-12-13T14:08:40.444889201Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:08:40.440973 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:08:40.451391 env[1478]: time="2024-12-13T14:08:40.450408739Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:08:40.451391 env[1478]: time="2024-12-13T14:08:40.451362741Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:08:40.451677 env[1478]: time="2024-12-13T14:08:40.451583500Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:08:40.451677 env[1478]: time="2024-12-13T14:08:40.451609976Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:08:40.451677 env[1478]: time="2024-12-13T14:08:40.451625702Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:08:40.451677 env[1478]: time="2024-12-13T14:08:40.451635330Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:08:40.452701 env[1478]: time="2024-12-13T14:08:40.452467098Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:08:40.452794 env[1478]: time="2024-12-13T14:08:40.452712488Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:08:40.455550 dbus-daemon[1453]: [system] SELinux support is enabled Dec 13 14:08:40.470200 env[1478]: time="2024-12-13T14:08:40.460176816Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:08:40.470200 env[1478]: time="2024-12-13T14:08:40.460202811Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:08:40.470200 env[1478]: time="2024-12-13T14:08:40.460285169Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:08:40.470200 env[1478]: time="2024-12-13T14:08:40.460297445Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:08:40.455729 systemd[1]: Started dbus.service. Dec 13 14:08:40.462205 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:08:40.462225 systemd[1]: Reached target system-config.target. Dec 13 14:08:40.472372 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:08:40.472399 systemd[1]: Reached target user-config.target. Dec 13 14:08:40.483152 systemd[1]: Started systemd-logind.service. Dec 13 14:08:40.490966 env[1478]: time="2024-12-13T14:08:40.490928757Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:08:40.491038 env[1478]: time="2024-12-13T14:08:40.490977458Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:08:40.491038 env[1478]: time="2024-12-13T14:08:40.490992742Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:08:40.491098 env[1478]: time="2024-12-13T14:08:40.491038033Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:08:40.491098 env[1478]: time="2024-12-13T14:08:40.491053197Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:08:40.491098 env[1478]: time="2024-12-13T14:08:40.491067037Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:08:40.491098 env[1478]: time="2024-12-13T14:08:40.491080035Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:08:40.491465 env[1478]: time="2024-12-13T14:08:40.491445493Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:08:40.491506 env[1478]: time="2024-12-13T14:08:40.491469121Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:08:40.491506 env[1478]: time="2024-12-13T14:08:40.491485208Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:08:40.491506 env[1478]: time="2024-12-13T14:08:40.491498687Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:08:40.491575 env[1478]: time="2024-12-13T14:08:40.491512286Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:08:40.491677 env[1478]: time="2024-12-13T14:08:40.491637970Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:08:40.491797 env[1478]: time="2024-12-13T14:08:40.491776250Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492042381Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492075276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492088996Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492130275Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492142671Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492154626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492166500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492190249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492203407Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492215161Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492228680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492244205Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492360101Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492375305Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499155 env[1478]: time="2024-12-13T14:08:40.492387781Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.494164 systemd[1]: Started containerd.service. Dec 13 14:08:40.499559 env[1478]: time="2024-12-13T14:08:40.492399575Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:08:40.499559 env[1478]: time="2024-12-13T14:08:40.492413455Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:08:40.499559 env[1478]: time="2024-12-13T14:08:40.492424326Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:08:40.499559 env[1478]: time="2024-12-13T14:08:40.492441697Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:08:40.499559 env[1478]: time="2024-12-13T14:08:40.492475434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:08:40.499667 env[1478]: time="2024-12-13T14:08:40.492691299Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:08:40.499667 env[1478]: time="2024-12-13T14:08:40.492748665Z" level=info msg="Connect containerd service" Dec 13 14:08:40.499667 env[1478]: time="2024-12-13T14:08:40.492783205Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:08:40.499667 env[1478]: time="2024-12-13T14:08:40.493329106Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:08:40.499667 env[1478]: time="2024-12-13T14:08:40.493544890Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:08:40.499667 env[1478]: time="2024-12-13T14:08:40.493579912Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:08:40.499667 env[1478]: time="2024-12-13T14:08:40.493616899Z" level=info msg="containerd successfully booted in 0.115369s" Dec 13 14:08:40.517835 env[1478]: time="2024-12-13T14:08:40.501337569Z" level=info msg="Start subscribing containerd event" Dec 13 14:08:40.523015 env[1478]: time="2024-12-13T14:08:40.522980501Z" level=info msg="Start recovering state" Dec 13 14:08:40.523097 env[1478]: time="2024-12-13T14:08:40.523074373Z" level=info msg="Start event monitor" Dec 13 14:08:40.523165 env[1478]: time="2024-12-13T14:08:40.523099245Z" level=info msg="Start snapshots syncer" Dec 13 14:08:40.523165 env[1478]: time="2024-12-13T14:08:40.523110758Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:08:40.523165 env[1478]: time="2024-12-13T14:08:40.523134667Z" level=info msg="Start streaming server" Dec 13 14:08:40.608323 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:08:40.900242 update_engine[1470]: I1213 14:08:40.884680 1470 main.cc:92] Flatcar Update Engine starting Dec 13 14:08:40.977351 systemd[1]: Started update-engine.service. Dec 13 14:08:40.978903 update_engine[1470]: I1213 14:08:40.978797 1470 update_check_scheduler.cc:74] Next update check in 6m58s Dec 13 14:08:40.984957 systemd[1]: Started locksmithd.service. Dec 13 14:08:40.994916 systemd[1]: Started kubelet.service. Dec 13 14:08:41.459762 kubelet[1554]: E1213 14:08:41.459699 1554 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:08:41.461925 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:08:41.462045 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:08:41.781291 sshd_keygen[1469]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:08:41.798599 systemd[1]: Finished sshd-keygen.service. Dec 13 14:08:41.804899 systemd[1]: Starting issuegen.service... Dec 13 14:08:41.810150 systemd[1]: Started waagent.service. Dec 13 14:08:41.815088 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:08:41.815255 systemd[1]: Finished issuegen.service. Dec 13 14:08:41.820839 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:08:41.868053 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:08:41.874892 systemd[1]: Started getty@tty1.service. Dec 13 14:08:41.880775 systemd[1]: Started serial-getty@ttyAMA0.service. Dec 13 14:08:41.886326 systemd[1]: Reached target getty.target. Dec 13 14:08:41.891518 systemd[1]: Reached target multi-user.target. Dec 13 14:08:41.898528 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:08:41.912014 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:08:41.912174 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:08:41.920510 systemd[1]: Startup finished in 759ms (kernel) + 14.079s (initrd) + 23.270s (userspace) = 38.108s. Dec 13 14:08:42.373004 locksmithd[1551]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:08:42.593957 login[1577]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 14:08:42.610035 login[1578]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:08:42.666307 systemd[1]: Created slice user-500.slice. Dec 13 14:08:42.667494 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:08:42.669878 systemd-logind[1464]: New session 1 of user core. Dec 13 14:08:42.705266 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:08:42.706874 systemd[1]: Starting user@500.service... Dec 13 14:08:42.761415 (systemd)[1581]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:08:42.989001 systemd[1581]: Queued start job for default target default.target. Dec 13 14:08:42.989521 systemd[1581]: Reached target paths.target. Dec 13 14:08:42.989540 systemd[1581]: Reached target sockets.target. Dec 13 14:08:42.989551 systemd[1581]: Reached target timers.target. Dec 13 14:08:42.989560 systemd[1581]: Reached target basic.target. Dec 13 14:08:42.989683 systemd[1]: Started user@500.service. Dec 13 14:08:42.990570 systemd[1]: Started session-1.scope. Dec 13 14:08:42.991063 systemd[1581]: Reached target default.target. Dec 13 14:08:42.991282 systemd[1581]: Startup finished in 223ms. Dec 13 14:08:43.594346 login[1577]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:08:43.598393 systemd-logind[1464]: New session 2 of user core. Dec 13 14:08:43.599226 systemd[1]: Started session-2.scope. Dec 13 14:08:47.436426 waagent[1575]: 2024-12-13T14:08:47.436319Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:08:47.457420 waagent[1575]: 2024-12-13T14:08:47.457330Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:08:47.462099 waagent[1575]: 2024-12-13T14:08:47.462026Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:08:47.468843 waagent[1575]: 2024-12-13T14:08:47.468746Z INFO Daemon Daemon Run daemon Dec 13 14:08:47.473539 waagent[1575]: 2024-12-13T14:08:47.473463Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:08:47.490621 waagent[1575]: 2024-12-13T14:08:47.490486Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:08:47.506408 waagent[1575]: 2024-12-13T14:08:47.506270Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:08:47.516454 waagent[1575]: 2024-12-13T14:08:47.516375Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:08:47.521634 waagent[1575]: 2024-12-13T14:08:47.521561Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:08:47.528089 waagent[1575]: 2024-12-13T14:08:47.528019Z INFO Daemon Daemon Activate resource disk Dec 13 14:08:47.532962 waagent[1575]: 2024-12-13T14:08:47.532904Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:08:47.547480 waagent[1575]: 2024-12-13T14:08:47.547403Z INFO Daemon Daemon Found device: None Dec 13 14:08:47.552013 waagent[1575]: 2024-12-13T14:08:47.551948Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:08:47.561015 waagent[1575]: 2024-12-13T14:08:47.560949Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:08:47.573812 waagent[1575]: 2024-12-13T14:08:47.573744Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:08:47.579973 waagent[1575]: 2024-12-13T14:08:47.579901Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:08:47.593255 waagent[1575]: 2024-12-13T14:08:47.593121Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:08:47.610997 waagent[1575]: 2024-12-13T14:08:47.610868Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:08:47.621619 waagent[1575]: 2024-12-13T14:08:47.621546Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:08:47.626748 waagent[1575]: 2024-12-13T14:08:47.626683Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:08:47.750028 waagent[1575]: 2024-12-13T14:08:47.749887Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:08:47.786896 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:08:47.822138 waagent[1575]: 2024-12-13T14:08:47.821893Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:08:47.828065 waagent[1575]: 2024-12-13T14:08:47.827977Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:08:47.833842 waagent[1575]: 2024-12-13T14:08:47.833769Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:08:47.841113 waagent[1575]: 2024-12-13T14:08:47.841041Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:08:47.847100 waagent[1575]: 2024-12-13T14:08:47.847032Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:08:47.852869 waagent[1575]: 2024-12-13T14:08:47.852805Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:08:48.000966 waagent[1575]: 2024-12-13T14:08:48.000846Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:08:48.008150 waagent[1575]: 2024-12-13T14:08:48.008104Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:08:48.013436 waagent[1575]: 2024-12-13T14:08:48.013377Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:08:48.387502 waagent[1575]: 2024-12-13T14:08:48.387314Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:08:48.403984 waagent[1575]: 2024-12-13T14:08:48.403908Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:08:48.410961 waagent[1575]: 2024-12-13T14:08:48.410885Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:08:48.501551 waagent[1575]: 2024-12-13T14:08:48.501419Z INFO Daemon Daemon Found private key matching thumbprint EE3A0BEF9CCC975AE1D27C85FF3F918C9B0B391A Dec 13 14:08:48.511347 waagent[1575]: 2024-12-13T14:08:48.511259Z INFO Daemon Daemon Certificate with thumbprint 921A0582942304D6E6A2503499BCC8677DAE42E9 has no matching private key. Dec 13 14:08:48.522660 waagent[1575]: 2024-12-13T14:08:48.522565Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:08:48.550412 waagent[1575]: 2024-12-13T14:08:48.550353Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 3e1f04aa-5e19-43a4-a6d9-e956d0f0e702 New eTag: 4831257204447335089] Dec 13 14:08:48.562355 waagent[1575]: 2024-12-13T14:08:48.562264Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:08:48.579774 waagent[1575]: 2024-12-13T14:08:48.579690Z INFO Daemon Daemon Starting provisioning Dec 13 14:08:48.588266 waagent[1575]: 2024-12-13T14:08:48.588176Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:08:48.593712 waagent[1575]: 2024-12-13T14:08:48.593620Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-4df065c637] Dec 13 14:08:48.639183 waagent[1575]: 2024-12-13T14:08:48.639053Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-4df065c637] Dec 13 14:08:48.646445 waagent[1575]: 2024-12-13T14:08:48.646354Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:08:48.653607 waagent[1575]: 2024-12-13T14:08:48.653527Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:08:48.669937 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:08:48.670097 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:08:48.670152 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:08:48.670424 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:08:48.673698 systemd-networkd[1233]: eth0: DHCPv6 lease lost Dec 13 14:08:48.675033 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:08:48.675203 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:08:48.677118 systemd[1]: Starting systemd-networkd.service... Dec 13 14:08:48.705231 systemd-networkd[1625]: enP56283s1: Link UP Dec 13 14:08:48.705243 systemd-networkd[1625]: enP56283s1: Gained carrier Dec 13 14:08:48.706147 systemd-networkd[1625]: eth0: Link UP Dec 13 14:08:48.706156 systemd-networkd[1625]: eth0: Gained carrier Dec 13 14:08:48.706465 systemd-networkd[1625]: lo: Link UP Dec 13 14:08:48.706473 systemd-networkd[1625]: lo: Gained carrier Dec 13 14:08:48.706901 systemd-networkd[1625]: eth0: Gained IPv6LL Dec 13 14:08:48.707114 systemd-networkd[1625]: Enumeration completed Dec 13 14:08:48.707212 systemd[1]: Started systemd-networkd.service. Dec 13 14:08:48.708704 systemd-networkd[1625]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:08:48.709030 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:08:48.716043 waagent[1575]: 2024-12-13T14:08:48.715875Z INFO Daemon Daemon Create user account if not exists Dec 13 14:08:48.722084 waagent[1575]: 2024-12-13T14:08:48.722004Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:08:48.729327 waagent[1575]: 2024-12-13T14:08:48.729241Z INFO Daemon Daemon Configure sudoer Dec 13 14:08:48.734778 systemd-networkd[1625]: eth0: DHCPv4 address 10.200.20.19/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:08:48.735703 waagent[1575]: 2024-12-13T14:08:48.735593Z INFO Daemon Daemon Configure sshd Dec 13 14:08:48.741074 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:08:48.741613 waagent[1575]: 2024-12-13T14:08:48.740950Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:08:49.936282 waagent[1575]: 2024-12-13T14:08:49.936188Z INFO Daemon Daemon Provisioning complete Dec 13 14:08:49.955026 waagent[1575]: 2024-12-13T14:08:49.954961Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:08:49.961588 waagent[1575]: 2024-12-13T14:08:49.961521Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:08:49.972719 waagent[1575]: 2024-12-13T14:08:49.972631Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:08:50.268382 waagent[1634]: 2024-12-13T14:08:50.268290Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:08:50.269452 waagent[1634]: 2024-12-13T14:08:50.269400Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:08:50.269703 waagent[1634]: 2024-12-13T14:08:50.269638Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:08:50.286736 waagent[1634]: 2024-12-13T14:08:50.286667Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:08:50.287027 waagent[1634]: 2024-12-13T14:08:50.286979Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:08:50.353803 waagent[1634]: 2024-12-13T14:08:50.353670Z INFO ExtHandler ExtHandler Found private key matching thumbprint EE3A0BEF9CCC975AE1D27C85FF3F918C9B0B391A Dec 13 14:08:50.354167 waagent[1634]: 2024-12-13T14:08:50.354116Z INFO ExtHandler ExtHandler Certificate with thumbprint 921A0582942304D6E6A2503499BCC8677DAE42E9 has no matching private key. Dec 13 14:08:50.354466 waagent[1634]: 2024-12-13T14:08:50.354418Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:08:50.369946 waagent[1634]: 2024-12-13T14:08:50.369891Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: f4269853-6ec9-4fd7-a068-5244963fbf44 New eTag: 4831257204447335089] Dec 13 14:08:50.370715 waagent[1634]: 2024-12-13T14:08:50.370598Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:08:50.458705 waagent[1634]: 2024-12-13T14:08:50.458543Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:08:50.468980 waagent[1634]: 2024-12-13T14:08:50.468905Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1634 Dec 13 14:08:50.472820 waagent[1634]: 2024-12-13T14:08:50.472757Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:08:50.474238 waagent[1634]: 2024-12-13T14:08:50.474179Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:08:50.600958 waagent[1634]: 2024-12-13T14:08:50.600846Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:08:50.601493 waagent[1634]: 2024-12-13T14:08:50.601439Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:08:50.609056 waagent[1634]: 2024-12-13T14:08:50.608998Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:08:50.609582 waagent[1634]: 2024-12-13T14:08:50.609520Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:08:50.610761 waagent[1634]: 2024-12-13T14:08:50.610697Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:08:50.612232 waagent[1634]: 2024-12-13T14:08:50.612158Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:08:50.613058 waagent[1634]: 2024-12-13T14:08:50.612998Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:08:50.613323 waagent[1634]: 2024-12-13T14:08:50.613273Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:08:50.613992 waagent[1634]: 2024-12-13T14:08:50.613928Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:08:50.614574 waagent[1634]: 2024-12-13T14:08:50.614504Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:08:50.614942 waagent[1634]: 2024-12-13T14:08:50.614882Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:08:50.615148 waagent[1634]: 2024-12-13T14:08:50.615097Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:08:50.615413 waagent[1634]: 2024-12-13T14:08:50.615346Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:08:50.615413 waagent[1634]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:08:50.615413 waagent[1634]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:08:50.615413 waagent[1634]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:08:50.615413 waagent[1634]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:08:50.615413 waagent[1634]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:08:50.615413 waagent[1634]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:08:50.615873 waagent[1634]: 2024-12-13T14:08:50.615798Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:08:50.616638 waagent[1634]: 2024-12-13T14:08:50.616564Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:08:50.618592 waagent[1634]: 2024-12-13T14:08:50.618433Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:08:50.618766 waagent[1634]: 2024-12-13T14:08:50.618681Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:08:50.618989 waagent[1634]: 2024-12-13T14:08:50.618923Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:08:50.619979 waagent[1634]: 2024-12-13T14:08:50.619893Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:08:50.620114 waagent[1634]: 2024-12-13T14:08:50.620047Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:08:50.621169 waagent[1634]: 2024-12-13T14:08:50.621086Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:08:50.630831 waagent[1634]: 2024-12-13T14:08:50.630759Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:08:50.632358 waagent[1634]: 2024-12-13T14:08:50.632290Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:08:50.635886 waagent[1634]: 2024-12-13T14:08:50.635818Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:08:50.679068 waagent[1634]: 2024-12-13T14:08:50.678935Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1625' Dec 13 14:08:50.702026 waagent[1634]: 2024-12-13T14:08:50.701951Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:08:50.791093 waagent[1634]: 2024-12-13T14:08:50.790974Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:08:50.791093 waagent[1634]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:08:50.791093 waagent[1634]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:08:50.791093 waagent[1634]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c0:c6:ea brd ff:ff:ff:ff:ff:ff Dec 13 14:08:50.791093 waagent[1634]: 3: enP56283s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c0:c6:ea brd ff:ff:ff:ff:ff:ff\ altname enP56283p0s2 Dec 13 14:08:50.791093 waagent[1634]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:08:50.791093 waagent[1634]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:08:50.791093 waagent[1634]: 2: eth0 inet 10.200.20.19/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:08:50.791093 waagent[1634]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:08:50.791093 waagent[1634]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:08:50.791093 waagent[1634]: 2: eth0 inet6 fe80::222:48ff:fec0:c6ea/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:08:51.073003 waagent[1634]: 2024-12-13T14:08:51.072936Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:08:51.492137 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:08:51.492298 systemd[1]: Stopped kubelet.service. Dec 13 14:08:51.493700 systemd[1]: Starting kubelet.service... Dec 13 14:08:51.575406 systemd[1]: Started kubelet.service. Dec 13 14:08:51.633057 kubelet[1675]: E1213 14:08:51.633000 1675 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:08:51.635841 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:08:51.635957 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:08:51.977413 waagent[1575]: 2024-12-13T14:08:51.977202Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:08:51.983554 waagent[1575]: 2024-12-13T14:08:51.983496Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:08:53.188377 waagent[1681]: 2024-12-13T14:08:53.188284Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:08:53.189397 waagent[1681]: 2024-12-13T14:08:53.189343Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:08:53.189623 waagent[1681]: 2024-12-13T14:08:53.189576Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:08:53.189868 waagent[1681]: 2024-12-13T14:08:53.189822Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Dec 13 14:08:53.197975 waagent[1681]: 2024-12-13T14:08:53.197883Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:08:53.198470 waagent[1681]: 2024-12-13T14:08:53.198419Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:08:53.198735 waagent[1681]: 2024-12-13T14:08:53.198685Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:08:53.218523 waagent[1681]: 2024-12-13T14:08:53.218449Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:08:53.234306 waagent[1681]: 2024-12-13T14:08:53.234245Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:08:53.235554 waagent[1681]: 2024-12-13T14:08:53.235500Z INFO ExtHandler Dec 13 14:08:53.235814 waagent[1681]: 2024-12-13T14:08:53.235764Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: b3527e06-9108-4863-b0d4-10316724357a eTag: 4831257204447335089 source: Fabric] Dec 13 14:08:53.236631 waagent[1681]: 2024-12-13T14:08:53.236577Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:08:53.237965 waagent[1681]: 2024-12-13T14:08:53.237907Z INFO ExtHandler Dec 13 14:08:53.238184 waagent[1681]: 2024-12-13T14:08:53.238138Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:08:53.244961 waagent[1681]: 2024-12-13T14:08:53.244916Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:08:53.245516 waagent[1681]: 2024-12-13T14:08:53.245471Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:08:53.269692 waagent[1681]: 2024-12-13T14:08:53.269583Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:08:53.343235 waagent[1681]: 2024-12-13T14:08:53.343099Z INFO ExtHandler Downloaded certificate {'thumbprint': 'EE3A0BEF9CCC975AE1D27C85FF3F918C9B0B391A', 'hasPrivateKey': True} Dec 13 14:08:53.347478 waagent[1681]: 2024-12-13T14:08:53.347410Z INFO ExtHandler Downloaded certificate {'thumbprint': '921A0582942304D6E6A2503499BCC8677DAE42E9', 'hasPrivateKey': False} Dec 13 14:08:53.348643 waagent[1681]: 2024-12-13T14:08:53.348586Z INFO ExtHandler Fetch goal state completed Dec 13 14:08:53.370910 waagent[1681]: 2024-12-13T14:08:53.370801Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:08:53.383410 waagent[1681]: 2024-12-13T14:08:53.383323Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1681 Dec 13 14:08:53.386896 waagent[1681]: 2024-12-13T14:08:53.386831Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:08:53.388096 waagent[1681]: 2024-12-13T14:08:53.388042Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:08:53.388491 waagent[1681]: 2024-12-13T14:08:53.388439Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:08:53.390759 waagent[1681]: 2024-12-13T14:08:53.390704Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:08:53.395787 waagent[1681]: 2024-12-13T14:08:53.395735Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:08:53.396266 waagent[1681]: 2024-12-13T14:08:53.396211Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:08:53.404225 waagent[1681]: 2024-12-13T14:08:53.404172Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:08:53.404835 waagent[1681]: 2024-12-13T14:08:53.404780Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:08:53.411042 waagent[1681]: 2024-12-13T14:08:53.410951Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Dec 13 14:08:53.412324 waagent[1681]: 2024-12-13T14:08:53.412238Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:08:53.413958 waagent[1681]: 2024-12-13T14:08:53.413889Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:08:53.414239 waagent[1681]: 2024-12-13T14:08:53.414168Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:08:53.414832 waagent[1681]: 2024-12-13T14:08:53.414759Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:08:53.415449 waagent[1681]: 2024-12-13T14:08:53.415379Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:08:53.415785 waagent[1681]: 2024-12-13T14:08:53.415725Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:08:53.415785 waagent[1681]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:08:53.415785 waagent[1681]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:08:53.415785 waagent[1681]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:08:53.415785 waagent[1681]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:08:53.415785 waagent[1681]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:08:53.415785 waagent[1681]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:08:53.418011 waagent[1681]: 2024-12-13T14:08:53.417894Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:08:53.418474 waagent[1681]: 2024-12-13T14:08:53.418388Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:08:53.418838 waagent[1681]: 2024-12-13T14:08:53.418760Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:08:53.421433 waagent[1681]: 2024-12-13T14:08:53.421302Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:08:53.421670 waagent[1681]: 2024-12-13T14:08:53.421598Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:08:53.422164 waagent[1681]: 2024-12-13T14:08:53.422092Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:08:53.422516 waagent[1681]: 2024-12-13T14:08:53.422451Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:08:53.424481 waagent[1681]: 2024-12-13T14:08:53.424353Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:08:53.426272 waagent[1681]: 2024-12-13T14:08:53.426203Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:08:53.426272 waagent[1681]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:08:53.426272 waagent[1681]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:08:53.426272 waagent[1681]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c0:c6:ea brd ff:ff:ff:ff:ff:ff Dec 13 14:08:53.426272 waagent[1681]: 3: enP56283s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c0:c6:ea brd ff:ff:ff:ff:ff:ff\ altname enP56283p0s2 Dec 13 14:08:53.426272 waagent[1681]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:08:53.426272 waagent[1681]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:08:53.426272 waagent[1681]: 2: eth0 inet 10.200.20.19/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:08:53.426272 waagent[1681]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:08:53.426272 waagent[1681]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:08:53.426272 waagent[1681]: 2: eth0 inet6 fe80::222:48ff:fec0:c6ea/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:08:53.428701 waagent[1681]: 2024-12-13T14:08:53.428604Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:08:53.428780 waagent[1681]: 2024-12-13T14:08:53.428365Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:08:53.432919 waagent[1681]: 2024-12-13T14:08:53.432849Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:08:53.445557 waagent[1681]: 2024-12-13T14:08:53.445440Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:08:53.486229 waagent[1681]: 2024-12-13T14:08:53.486149Z INFO ExtHandler ExtHandler Dec 13 14:08:53.486380 waagent[1681]: 2024-12-13T14:08:53.486329Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: ce8ee97f-7d68-451a-853e-07bdf870898d correlation ba02aac0-ce12-4cde-a9d1-83f2856abd55 created: 2024-12-13T14:07:12.618469Z] Dec 13 14:08:53.487934 waagent[1681]: 2024-12-13T14:08:53.487860Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:08:53.491552 waagent[1681]: 2024-12-13T14:08:53.491486Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 5 ms] Dec 13 14:08:53.519211 waagent[1681]: 2024-12-13T14:08:53.519128Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:08:53.547607 waagent[1681]: 2024-12-13T14:08:53.547425Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 0BE2AEB0-7C32-4232-AC0B-E98EA1127825;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:08:53.582954 waagent[1681]: 2024-12-13T14:08:53.582831Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Dec 13 14:08:53.582954 waagent[1681]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:08:53.582954 waagent[1681]: pkts bytes target prot opt in out source destination Dec 13 14:08:53.582954 waagent[1681]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:08:53.582954 waagent[1681]: pkts bytes target prot opt in out source destination Dec 13 14:08:53.582954 waagent[1681]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:08:53.582954 waagent[1681]: pkts bytes target prot opt in out source destination Dec 13 14:08:53.582954 waagent[1681]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:08:53.582954 waagent[1681]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:08:53.582954 waagent[1681]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:08:53.591437 waagent[1681]: 2024-12-13T14:08:53.591305Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:08:53.591437 waagent[1681]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:08:53.591437 waagent[1681]: pkts bytes target prot opt in out source destination Dec 13 14:08:53.591437 waagent[1681]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:08:53.591437 waagent[1681]: pkts bytes target prot opt in out source destination Dec 13 14:08:53.591437 waagent[1681]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:08:53.591437 waagent[1681]: pkts bytes target prot opt in out source destination Dec 13 14:08:53.591437 waagent[1681]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:08:53.591437 waagent[1681]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:08:53.591437 waagent[1681]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:08:53.592006 waagent[1681]: 2024-12-13T14:08:53.591955Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:09:01.742214 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:09:01.742382 systemd[1]: Stopped kubelet.service. Dec 13 14:09:01.743739 systemd[1]: Starting kubelet.service... Dec 13 14:09:02.027352 systemd[1]: Started kubelet.service. Dec 13 14:09:02.069211 kubelet[1733]: E1213 14:09:02.069173 1733 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:09:02.071549 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:09:02.071693 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:09:12.242176 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:09:12.242338 systemd[1]: Stopped kubelet.service. Dec 13 14:09:12.243705 systemd[1]: Starting kubelet.service... Dec 13 14:09:12.378537 systemd[1]: Started kubelet.service. Dec 13 14:09:12.418285 kubelet[1744]: E1213 14:09:12.418228 1744 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:09:12.420503 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:09:12.420620 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:09:19.037032 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Dec 13 14:09:19.931779 systemd[1]: Created slice system-sshd.slice. Dec 13 14:09:19.933245 systemd[1]: Started sshd@0-10.200.20.19:22-10.200.16.10:57224.service. Dec 13 14:09:20.581215 sshd[1751]: Accepted publickey for core from 10.200.16.10 port 57224 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:20.653918 sshd[1751]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:20.657813 systemd-logind[1464]: New session 3 of user core. Dec 13 14:09:20.658203 systemd[1]: Started session-3.scope. Dec 13 14:09:20.984062 systemd[1]: Started sshd@1-10.200.20.19:22-10.200.16.10:57232.service. Dec 13 14:09:21.389412 sshd[1756]: Accepted publickey for core from 10.200.16.10 port 57232 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:21.390670 sshd[1756]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:21.395004 systemd[1]: Started session-4.scope. Dec 13 14:09:21.395708 systemd-logind[1464]: New session 4 of user core. Dec 13 14:09:21.699042 sshd[1756]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:21.701602 systemd[1]: sshd@1-10.200.20.19:22-10.200.16.10:57232.service: Deactivated successfully. Dec 13 14:09:21.702268 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:09:21.702838 systemd-logind[1464]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:09:21.703472 systemd-logind[1464]: Removed session 4. Dec 13 14:09:21.766056 systemd[1]: Started sshd@2-10.200.20.19:22-10.200.16.10:57244.service. Dec 13 14:09:22.171208 sshd[1762]: Accepted publickey for core from 10.200.16.10 port 57244 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:22.172441 sshd[1762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:22.176175 systemd-logind[1464]: New session 5 of user core. Dec 13 14:09:22.176580 systemd[1]: Started session-5.scope. Dec 13 14:09:22.476804 sshd[1762]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:22.479359 systemd[1]: sshd@2-10.200.20.19:22-10.200.16.10:57244.service: Deactivated successfully. Dec 13 14:09:22.480046 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:09:22.480702 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:09:22.481078 systemd[1]: Stopped kubelet.service. Dec 13 14:09:22.481088 systemd-logind[1464]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:09:22.482338 systemd[1]: Starting kubelet.service... Dec 13 14:09:22.484595 systemd-logind[1464]: Removed session 5. Dec 13 14:09:22.548885 systemd[1]: Started sshd@3-10.200.20.19:22-10.200.16.10:57248.service. Dec 13 14:09:22.785091 systemd[1]: Started kubelet.service. Dec 13 14:09:22.829588 kubelet[1774]: E1213 14:09:22.829535 1774 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:09:22.831792 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:09:22.831910 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:09:22.958179 sshd[1770]: Accepted publickey for core from 10.200.16.10 port 57248 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:22.959289 sshd[1770]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:22.963415 systemd[1]: Started session-6.scope. Dec 13 14:09:22.963752 systemd-logind[1464]: New session 6 of user core. Dec 13 14:09:23.262171 sshd[1770]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:23.264569 systemd[1]: sshd@3-10.200.20.19:22-10.200.16.10:57248.service: Deactivated successfully. Dec 13 14:09:23.265244 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:09:23.265796 systemd-logind[1464]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:09:23.266592 systemd-logind[1464]: Removed session 6. Dec 13 14:09:23.330900 systemd[1]: Started sshd@4-10.200.20.19:22-10.200.16.10:57256.service. Dec 13 14:09:23.743743 sshd[1785]: Accepted publickey for core from 10.200.16.10 port 57256 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:23.745043 sshd[1785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:23.749127 systemd[1]: Started session-7.scope. Dec 13 14:09:23.749659 systemd-logind[1464]: New session 7 of user core. Dec 13 14:09:24.226367 sudo[1788]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:09:24.226573 sudo[1788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:09:24.287834 dbus-daemon[1453]: avc: received setenforce notice (enforcing=1) Dec 13 14:09:24.289583 sudo[1788]: pam_unix(sudo:session): session closed for user root Dec 13 14:09:24.406504 sshd[1785]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:24.410032 systemd[1]: sshd@4-10.200.20.19:22-10.200.16.10:57256.service: Deactivated successfully. Dec 13 14:09:24.410419 systemd-logind[1464]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:09:24.410755 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:09:24.411701 systemd-logind[1464]: Removed session 7. Dec 13 14:09:24.474480 systemd[1]: Started sshd@5-10.200.20.19:22-10.200.16.10:57272.service. Dec 13 14:09:24.884357 sshd[1792]: Accepted publickey for core from 10.200.16.10 port 57272 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:24.885683 sshd[1792]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:24.889408 systemd-logind[1464]: New session 8 of user core. Dec 13 14:09:24.889848 systemd[1]: Started session-8.scope. Dec 13 14:09:25.120567 sudo[1796]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:09:25.120812 sudo[1796]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:09:25.123272 sudo[1796]: pam_unix(sudo:session): session closed for user root Dec 13 14:09:25.127119 sudo[1795]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:09:25.127527 sudo[1795]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:09:25.135245 systemd[1]: Stopping audit-rules.service... Dec 13 14:09:25.135000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:09:25.140561 kernel: kauditd_printk_skb: 144 callbacks suppressed Dec 13 14:09:25.140643 kernel: audit: type=1305 audit(1734098965.135:224): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:09:25.140997 auditctl[1799]: No rules Dec 13 14:09:25.141395 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:09:25.141555 systemd[1]: Stopped audit-rules.service. Dec 13 14:09:25.135000 audit[1799]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff4759810 a2=420 a3=0 items=0 ppid=1 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:25.175322 kernel: audit: type=1300 audit(1734098965.135:224): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff4759810 a2=420 a3=0 items=0 ppid=1 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:25.152385 systemd[1]: Starting audit-rules.service... Dec 13 14:09:25.135000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:09:25.182595 kernel: audit: type=1327 audit(1734098965.135:224): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:09:25.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.200238 kernel: audit: type=1131 audit(1734098965.140:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.198527 systemd[1]: Finished audit-rules.service. Dec 13 14:09:25.199927 sudo[1795]: pam_unix(sudo:session): session closed for user root Dec 13 14:09:25.200401 augenrules[1816]: No rules Dec 13 14:09:25.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.199000 audit[1795]: USER_END pid=1795 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.235532 kernel: audit: type=1130 audit(1734098965.198:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.235596 kernel: audit: type=1106 audit(1734098965.199:227): pid=1795 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.199000 audit[1795]: CRED_DISP pid=1795 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.252660 kernel: audit: type=1104 audit(1734098965.199:228): pid=1795 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.268844 sshd[1792]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:25.269000 audit[1792]: USER_END pid=1792 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:25.294136 systemd[1]: sshd@5-10.200.20.19:22-10.200.16.10:57272.service: Deactivated successfully. Dec 13 14:09:25.269000 audit[1792]: CRED_DISP pid=1792 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:25.312677 kernel: audit: type=1106 audit(1734098965.269:229): pid=1792 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:25.312772 kernel: audit: type=1104 audit(1734098965.269:230): pid=1792 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:25.294851 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:09:25.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.19:22-10.200.16.10:57272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.330196 kernel: audit: type=1131 audit(1734098965.293:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.19:22-10.200.16.10:57272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.330333 systemd-logind[1464]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:09:25.331175 systemd-logind[1464]: Removed session 8. Dec 13 14:09:25.339337 systemd[1]: Started sshd@6-10.200.20.19:22-10.200.16.10:57276.service. Dec 13 14:09:25.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.19:22-10.200.16.10:57276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.744000 audit[1822]: USER_ACCT pid=1822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:25.745043 sshd[1822]: Accepted publickey for core from 10.200.16.10 port 57276 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:25.745000 audit[1822]: CRED_ACQ pid=1822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:25.745000 audit[1822]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff53992f0 a2=3 a3=1 items=0 ppid=1 pid=1822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:25.745000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:25.746548 sshd[1822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:25.750299 systemd-logind[1464]: New session 9 of user core. Dec 13 14:09:25.750759 systemd[1]: Started session-9.scope. Dec 13 14:09:25.754000 audit[1822]: USER_START pid=1822 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:25.755000 audit[1824]: CRED_ACQ pid=1824 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:25.813097 update_engine[1470]: I1213 14:09:25.812717 1470 update_attempter.cc:509] Updating boot flags... Dec 13 14:09:25.979000 audit[1891]: USER_ACCT pid=1891 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.979000 audit[1891]: CRED_REFR pid=1891 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.980258 sudo[1891]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:09:25.980470 sudo[1891]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:09:25.985000 audit[1891]: USER_START pid=1891 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:09:25.996331 systemd[1]: Starting coreos-metadata.service... Dec 13 14:09:26.072244 coreos-metadata[1895]: Dec 13 14:09:26.072 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:09:26.075660 coreos-metadata[1895]: Dec 13 14:09:26.075 INFO Fetch successful Dec 13 14:09:26.075814 coreos-metadata[1895]: Dec 13 14:09:26.075 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Dec 13 14:09:26.077848 coreos-metadata[1895]: Dec 13 14:09:26.077 INFO Fetch successful Dec 13 14:09:26.078212 coreos-metadata[1895]: Dec 13 14:09:26.078 INFO Fetching http://168.63.129.16/machine/25ff45a1-5b81-4c0e-a868-ee36e89f2312/10423d97%2D83cb%2D4ad6%2D8538%2D8ea374f8af83.%5Fci%2D3510.3.6%2Da%2D4df065c637?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Dec 13 14:09:26.080264 coreos-metadata[1895]: Dec 13 14:09:26.080 INFO Fetch successful Dec 13 14:09:26.113348 coreos-metadata[1895]: Dec 13 14:09:26.113 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:09:26.125775 coreos-metadata[1895]: Dec 13 14:09:26.125 INFO Fetch successful Dec 13 14:09:26.134715 systemd[1]: Finished coreos-metadata.service. Dec 13 14:09:26.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:30.568108 systemd[1]: Stopped kubelet.service. Dec 13 14:09:30.589071 kernel: kauditd_printk_skb: 12 callbacks suppressed Dec 13 14:09:30.589165 kernel: audit: type=1130 audit(1734098970.567:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:30.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:30.570293 systemd[1]: Starting kubelet.service... Dec 13 14:09:30.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:30.606186 kernel: audit: type=1131 audit(1734098970.567:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:30.625010 systemd[1]: Reloading. Dec 13 14:09:30.714184 /usr/lib/systemd/system-generators/torcx-generator[1953]: time="2024-12-13T14:09:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:09:30.714215 /usr/lib/systemd/system-generators/torcx-generator[1953]: time="2024-12-13T14:09:30Z" level=info msg="torcx already run" Dec 13 14:09:30.772424 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:09:30.772446 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:09:30.787815 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:09:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.873692 kernel: audit: type=1400 audit(1734098970.856:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912840 kernel: audit: type=1400 audit(1734098970.856:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912916 kernel: audit: type=1400 audit(1734098970.856:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.931195 kernel: audit: type=1400 audit(1734098970.856:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.949807 kernel: audit: type=1400 audit(1734098970.856:248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.949884 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:09:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.973252 kernel: audit: type=1400 audit(1734098970.856:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.973361 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:09:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit: BPF prog-id=47 op=LOAD Dec 13 14:09:30.872000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.872000 audit: BPF prog-id=48 op=LOAD Dec 13 14:09:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.890000 audit: BPF prog-id=49 op=LOAD Dec 13 14:09:30.890000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:09:30.890000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:09:30.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912000 audit: BPF prog-id=50 op=LOAD Dec 13 14:09:30.912000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:09:30.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit: BPF prog-id=51 op=LOAD Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.930000 audit: BPF prog-id=52 op=LOAD Dec 13 14:09:30.930000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:09:30.930000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:09:30.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit: BPF prog-id=53 op=LOAD Dec 13 14:09:30.979000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit: BPF prog-id=54 op=LOAD Dec 13 14:09:30.980000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit: BPF prog-id=55 op=LOAD Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit: BPF prog-id=56 op=LOAD Dec 13 14:09:30.980000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:09:30.980000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.980000 audit: BPF prog-id=57 op=LOAD Dec 13 14:09:30.980000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit: BPF prog-id=58 op=LOAD Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit: BPF prog-id=59 op=LOAD Dec 13 14:09:30.981000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:09:30.981000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.981000 audit: BPF prog-id=60 op=LOAD Dec 13 14:09:30.981000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:30.982000 audit: BPF prog-id=61 op=LOAD Dec 13 14:09:30.982000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:09:31.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:31.004794 systemd[1]: Started kubelet.service. Dec 13 14:09:31.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:31.007558 systemd[1]: Stopping kubelet.service... Dec 13 14:09:31.007916 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:09:31.008086 systemd[1]: Stopped kubelet.service. Dec 13 14:09:31.009567 systemd[1]: Starting kubelet.service... Dec 13 14:09:31.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:31.092094 systemd[1]: Started kubelet.service. Dec 13 14:09:31.132726 kubelet[2023]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:09:31.132726 kubelet[2023]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:09:31.132726 kubelet[2023]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:09:31.132726 kubelet[2023]: I1213 14:09:31.129332 2023 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:09:31.993655 kubelet[2023]: I1213 14:09:31.993608 2023 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:09:31.993655 kubelet[2023]: I1213 14:09:31.993637 2023 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:09:31.993851 kubelet[2023]: I1213 14:09:31.993834 2023 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:09:32.003450 kubelet[2023]: I1213 14:09:32.003426 2023 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:09:32.017829 kubelet[2023]: I1213 14:09:32.017800 2023 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:09:32.020776 kubelet[2023]: I1213 14:09:32.020722 2023 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:09:32.021118 kubelet[2023]: I1213 14:09:32.020873 2023 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.19","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:09:32.021249 kubelet[2023]: I1213 14:09:32.021236 2023 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:09:32.021315 kubelet[2023]: I1213 14:09:32.021306 2023 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:09:32.021475 kubelet[2023]: I1213 14:09:32.021464 2023 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:09:32.022355 kubelet[2023]: I1213 14:09:32.022334 2023 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:09:32.022440 kubelet[2023]: I1213 14:09:32.022430 2023 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:09:32.022514 kubelet[2023]: I1213 14:09:32.022506 2023 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:09:32.022588 kubelet[2023]: I1213 14:09:32.022579 2023 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:09:32.024229 kubelet[2023]: E1213 14:09:32.024194 2023 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:32.024288 kubelet[2023]: E1213 14:09:32.024242 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:32.024830 kubelet[2023]: I1213 14:09:32.024736 2023 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:09:32.024978 kubelet[2023]: I1213 14:09:32.024952 2023 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:09:32.025025 kubelet[2023]: W1213 14:09:32.025000 2023 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:09:32.026338 kubelet[2023]: I1213 14:09:32.026319 2023 server.go:1264] "Started kubelet" Dec 13 14:09:32.026925 kubelet[2023]: I1213 14:09:32.026887 2023 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:09:32.027711 kubelet[2023]: I1213 14:09:32.027688 2023 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:09:32.029477 kubelet[2023]: I1213 14:09:32.029428 2023 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:09:32.029834 kubelet[2023]: I1213 14:09:32.029818 2023 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:09:32.030000 audit[2023]: AVC avc: denied { mac_admin } for pid=2023 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:32.030000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:09:32.030000 audit[2023]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400047dbc0 a1=4000c3cc00 a2=400047db60 a3=25 items=0 ppid=1 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.030000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:09:32.030000 audit[2023]: AVC avc: denied { mac_admin } for pid=2023 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:32.030000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:09:32.030000 audit[2023]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c19940 a1=4000c3cc18 a2=400047dd10 a3=25 items=0 ppid=1 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.030000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:09:32.032086 kubelet[2023]: I1213 14:09:32.031812 2023 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:09:32.032086 kubelet[2023]: I1213 14:09:32.031857 2023 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:09:32.032086 kubelet[2023]: I1213 14:09:32.031913 2023 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:09:32.032000 audit[2034]: NETFILTER_CFG table=mangle:8 family=2 entries=2 op=nft_register_chain pid=2034 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:32.032000 audit[2034]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd3ac6180 a2=0 a3=1 items=0 ppid=2023 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:09:32.034892 kubelet[2023]: E1213 14:09:32.034876 2023 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:09:32.033000 audit[2035]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=2035 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:32.033000 audit[2035]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffff5c38c30 a2=0 a3=1 items=0 ppid=2023 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:09:32.035955 kubelet[2023]: I1213 14:09:32.035928 2023 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:09:32.035000 audit[2037]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2037 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:32.035000 audit[2037]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdd561c90 a2=0 a3=1 items=0 ppid=2023 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:09:32.037370 kubelet[2023]: I1213 14:09:32.037349 2023 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:09:32.038057 kubelet[2023]: I1213 14:09:32.038026 2023 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:09:32.039043 kubelet[2023]: I1213 14:09:32.039019 2023 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:09:32.038000 audit[2039]: NETFILTER_CFG table=filter:11 family=2 entries=2 op=nft_register_chain pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:32.038000 audit[2039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe3c460e0 a2=0 a3=1 items=0 ppid=2023 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:09:32.041272 kubelet[2023]: I1213 14:09:32.041254 2023 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:09:32.041382 kubelet[2023]: I1213 14:09:32.041370 2023 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:09:32.060281 kubelet[2023]: E1213 14:09:32.060224 2023 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.19\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:09:32.060400 kubelet[2023]: E1213 14:09:32.060279 2023 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.19.1810c1d3d0ff66eb default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.19,UID:10.200.20.19,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.20.19,},FirstTimestamp:2024-12-13 14:09:32.026300139 +0000 UTC m=+0.930173103,LastTimestamp:2024-12-13 14:09:32.026300139 +0000 UTC m=+0.930173103,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.19,}" Dec 13 14:09:32.060566 kubelet[2023]: W1213 14:09:32.060542 2023 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.200.20.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:09:32.060610 kubelet[2023]: E1213 14:09:32.060571 2023 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:09:32.060690 kubelet[2023]: W1213 14:09:32.060623 2023 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:09:32.060690 kubelet[2023]: E1213 14:09:32.060636 2023 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:09:32.061607 kubelet[2023]: W1213 14:09:32.061542 2023 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:09:32.061607 kubelet[2023]: E1213 14:09:32.061567 2023 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:09:32.065079 kubelet[2023]: I1213 14:09:32.065063 2023 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:09:32.065254 kubelet[2023]: I1213 14:09:32.065241 2023 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:09:32.065340 kubelet[2023]: I1213 14:09:32.065330 2023 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:09:32.071441 kubelet[2023]: I1213 14:09:32.071415 2023 policy_none.go:49] "None policy: Start" Dec 13 14:09:32.072217 kubelet[2023]: I1213 14:09:32.072194 2023 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:09:32.072217 kubelet[2023]: I1213 14:09:32.072219 2023 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:09:32.083535 systemd[1]: Created slice kubepods.slice. Dec 13 14:09:32.088310 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:09:32.091356 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:09:32.098543 kubelet[2023]: I1213 14:09:32.098513 2023 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:09:32.096000 audit[2023]: AVC avc: denied { mac_admin } for pid=2023 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:32.096000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:09:32.096000 audit[2023]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dca0f0 a1=4000d83608 a2=4000dca0c0 a3=25 items=0 ppid=1 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.096000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:09:32.098793 kubelet[2023]: I1213 14:09:32.098596 2023 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:09:32.098793 kubelet[2023]: I1213 14:09:32.098732 2023 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:09:32.098860 kubelet[2023]: I1213 14:09:32.098841 2023 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:09:32.100195 kubelet[2023]: E1213 14:09:32.100166 2023 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.19\" not found" Dec 13 14:09:32.137504 kubelet[2023]: I1213 14:09:32.137472 2023 kubelet_node_status.go:73] "Attempting to register node" node="10.200.20.19" Dec 13 14:09:32.144346 kubelet[2023]: I1213 14:09:32.144323 2023 kubelet_node_status.go:76] "Successfully registered node" node="10.200.20.19" Dec 13 14:09:32.155361 kubelet[2023]: E1213 14:09:32.155337 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:32.256711 kubelet[2023]: E1213 14:09:32.255566 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:32.323000 audit[2045]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2045 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:32.323000 audit[2045]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdfe90270 a2=0 a3=1 items=0 ppid=2023 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:09:32.325537 kubelet[2023]: I1213 14:09:32.325506 2023 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:09:32.324000 audit[2046]: NETFILTER_CFG table=mangle:13 family=2 entries=1 op=nft_register_chain pid=2046 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:32.324000 audit[2046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2c1d430 a2=0 a3=1 items=0 ppid=2023 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:09:32.325000 audit[2047]: NETFILTER_CFG table=mangle:14 family=10 entries=2 op=nft_register_chain pid=2047 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:32.325000 audit[2047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffca61a0b0 a2=0 a3=1 items=0 ppid=2023 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:09:32.327320 kubelet[2023]: I1213 14:09:32.327304 2023 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:09:32.325000 audit[2048]: NETFILTER_CFG table=nat:15 family=2 entries=2 op=nft_register_chain pid=2048 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:32.325000 audit[2048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe3fc2da0 a2=0 a3=1 items=0 ppid=2023 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:09:32.327529 kubelet[2023]: I1213 14:09:32.327519 2023 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:09:32.327757 kubelet[2023]: I1213 14:09:32.327746 2023 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:09:32.327889 kubelet[2023]: E1213 14:09:32.327876 2023 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:09:32.326000 audit[2049]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=2049 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:32.326000 audit[2049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc0518900 a2=0 a3=1 items=0 ppid=2023 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.326000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:09:32.328000 audit[2050]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2050 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:32.328000 audit[2050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff5bed20 a2=0 a3=1 items=0 ppid=2023 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:09:32.329000 audit[2051]: NETFILTER_CFG table=nat:18 family=10 entries=2 op=nft_register_chain pid=2051 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:32.329000 audit[2051]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe5c0de70 a2=0 a3=1 items=0 ppid=2023 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:09:32.330000 audit[2052]: NETFILTER_CFG table=filter:19 family=10 entries=2 op=nft_register_chain pid=2052 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:32.330000 audit[2052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff4847160 a2=0 a3=1 items=0 ppid=2023 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:32.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:09:32.357483 kubelet[2023]: E1213 14:09:32.357464 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:32.458174 kubelet[2023]: E1213 14:09:32.458151 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:32.559105 kubelet[2023]: E1213 14:09:32.559032 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:32.608495 sudo[1891]: pam_unix(sudo:session): session closed for user root Dec 13 14:09:32.606000 audit[1891]: USER_END pid=1891 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:09:32.606000 audit[1891]: CRED_DISP pid=1891 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:09:32.659689 kubelet[2023]: E1213 14:09:32.659668 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:32.683867 sshd[1822]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:32.683000 audit[1822]: USER_END pid=1822 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:32.683000 audit[1822]: CRED_DISP pid=1822 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:32.686422 systemd[1]: sshd@6-10.200.20.19:22-10.200.16.10:57276.service: Deactivated successfully. Dec 13 14:09:32.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.19:22-10.200.16.10:57276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:32.687108 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:09:32.687639 systemd-logind[1464]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:09:32.688545 systemd-logind[1464]: Removed session 9. Dec 13 14:09:32.760209 kubelet[2023]: E1213 14:09:32.760181 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:32.860789 kubelet[2023]: E1213 14:09:32.860714 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:32.961365 kubelet[2023]: E1213 14:09:32.961343 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:32.995635 kubelet[2023]: I1213 14:09:32.995619 2023 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:09:32.995961 kubelet[2023]: W1213 14:09:32.995944 2023 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:09:33.024337 kubelet[2023]: E1213 14:09:33.024314 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:33.061871 kubelet[2023]: E1213 14:09:33.061852 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:33.162116 kubelet[2023]: E1213 14:09:33.162007 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:33.262917 kubelet[2023]: E1213 14:09:33.262890 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:33.363440 kubelet[2023]: E1213 14:09:33.363405 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:33.464009 kubelet[2023]: E1213 14:09:33.463909 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:33.564679 kubelet[2023]: E1213 14:09:33.564639 2023 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Dec 13 14:09:33.666000 kubelet[2023]: I1213 14:09:33.665976 2023 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:09:33.666533 env[1478]: time="2024-12-13T14:09:33.666436484Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:09:33.666835 kubelet[2023]: I1213 14:09:33.666607 2023 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:09:34.024615 kubelet[2023]: E1213 14:09:34.024588 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:34.024802 kubelet[2023]: I1213 14:09:34.024700 2023 apiserver.go:52] "Watching apiserver" Dec 13 14:09:34.032183 kubelet[2023]: I1213 14:09:34.032145 2023 topology_manager.go:215] "Topology Admit Handler" podUID="a20a9afb-aaf8-47db-b1f6-876f7849a154" podNamespace="calico-system" podName="calico-node-bd6gg" Dec 13 14:09:34.032292 kubelet[2023]: I1213 14:09:34.032239 2023 topology_manager.go:215] "Topology Admit Handler" podUID="9e54fc8c-4579-4b2f-a627-7560b366e192" podNamespace="calico-system" podName="csi-node-driver-vhlnb" Dec 13 14:09:34.032326 kubelet[2023]: I1213 14:09:34.032295 2023 topology_manager.go:215] "Topology Admit Handler" podUID="bfe1516d-cc75-4943-8bc5-0a75df785c1d" podNamespace="kube-system" podName="kube-proxy-q9gfd" Dec 13 14:09:34.032783 kubelet[2023]: E1213 14:09:34.032695 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vhlnb" podUID="9e54fc8c-4579-4b2f-a627-7560b366e192" Dec 13 14:09:34.036811 systemd[1]: Created slice kubepods-besteffort-poda20a9afb_aaf8_47db_b1f6_876f7849a154.slice. Dec 13 14:09:34.038482 kubelet[2023]: I1213 14:09:34.038461 2023 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:09:34.046786 systemd[1]: Created slice kubepods-besteffort-podbfe1516d_cc75_4943_8bc5_0a75df785c1d.slice. Dec 13 14:09:34.050294 kubelet[2023]: I1213 14:09:34.050270 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a20a9afb-aaf8-47db-b1f6-876f7849a154-tigera-ca-bundle\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050357 kubelet[2023]: I1213 14:09:34.050301 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9e54fc8c-4579-4b2f-a627-7560b366e192-registration-dir\") pod \"csi-node-driver-vhlnb\" (UID: \"9e54fc8c-4579-4b2f-a627-7560b366e192\") " pod="calico-system/csi-node-driver-vhlnb" Dec 13 14:09:34.050357 kubelet[2023]: I1213 14:09:34.050320 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9ms2q\" (UniqueName: \"kubernetes.io/projected/9e54fc8c-4579-4b2f-a627-7560b366e192-kube-api-access-9ms2q\") pod \"csi-node-driver-vhlnb\" (UID: \"9e54fc8c-4579-4b2f-a627-7560b366e192\") " pod="calico-system/csi-node-driver-vhlnb" Dec 13 14:09:34.050357 kubelet[2023]: I1213 14:09:34.050334 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bfe1516d-cc75-4943-8bc5-0a75df785c1d-lib-modules\") pod \"kube-proxy-q9gfd\" (UID: \"bfe1516d-cc75-4943-8bc5-0a75df785c1d\") " pod="kube-system/kube-proxy-q9gfd" Dec 13 14:09:34.050357 kubelet[2023]: I1213 14:09:34.050349 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltw5g\" (UniqueName: \"kubernetes.io/projected/bfe1516d-cc75-4943-8bc5-0a75df785c1d-kube-api-access-ltw5g\") pod \"kube-proxy-q9gfd\" (UID: \"bfe1516d-cc75-4943-8bc5-0a75df785c1d\") " pod="kube-system/kube-proxy-q9gfd" Dec 13 14:09:34.050452 kubelet[2023]: I1213 14:09:34.050364 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/bfe1516d-cc75-4943-8bc5-0a75df785c1d-kube-proxy\") pod \"kube-proxy-q9gfd\" (UID: \"bfe1516d-cc75-4943-8bc5-0a75df785c1d\") " pod="kube-system/kube-proxy-q9gfd" Dec 13 14:09:34.050452 kubelet[2023]: I1213 14:09:34.050377 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a20a9afb-aaf8-47db-b1f6-876f7849a154-xtables-lock\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050452 kubelet[2023]: I1213 14:09:34.050392 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a20a9afb-aaf8-47db-b1f6-876f7849a154-node-certs\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050452 kubelet[2023]: I1213 14:09:34.050408 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a20a9afb-aaf8-47db-b1f6-876f7849a154-var-lib-calico\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050452 kubelet[2023]: I1213 14:09:34.050422 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a20a9afb-aaf8-47db-b1f6-876f7849a154-cni-bin-dir\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050558 kubelet[2023]: I1213 14:09:34.050436 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a20a9afb-aaf8-47db-b1f6-876f7849a154-flexvol-driver-host\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050558 kubelet[2023]: I1213 14:09:34.050462 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9e54fc8c-4579-4b2f-a627-7560b366e192-socket-dir\") pod \"csi-node-driver-vhlnb\" (UID: \"9e54fc8c-4579-4b2f-a627-7560b366e192\") " pod="calico-system/csi-node-driver-vhlnb" Dec 13 14:09:34.050558 kubelet[2023]: I1213 14:09:34.050479 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9e54fc8c-4579-4b2f-a627-7560b366e192-kubelet-dir\") pod \"csi-node-driver-vhlnb\" (UID: \"9e54fc8c-4579-4b2f-a627-7560b366e192\") " pod="calico-system/csi-node-driver-vhlnb" Dec 13 14:09:34.050558 kubelet[2023]: I1213 14:09:34.050494 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bfe1516d-cc75-4943-8bc5-0a75df785c1d-xtables-lock\") pod \"kube-proxy-q9gfd\" (UID: \"bfe1516d-cc75-4943-8bc5-0a75df785c1d\") " pod="kube-system/kube-proxy-q9gfd" Dec 13 14:09:34.050558 kubelet[2023]: I1213 14:09:34.050508 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a20a9afb-aaf8-47db-b1f6-876f7849a154-lib-modules\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050699 kubelet[2023]: I1213 14:09:34.050528 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a20a9afb-aaf8-47db-b1f6-876f7849a154-policysync\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050699 kubelet[2023]: I1213 14:09:34.050543 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a20a9afb-aaf8-47db-b1f6-876f7849a154-var-run-calico\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050699 kubelet[2023]: I1213 14:09:34.050559 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a20a9afb-aaf8-47db-b1f6-876f7849a154-cni-log-dir\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050699 kubelet[2023]: I1213 14:09:34.050574 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tx6d2\" (UniqueName: \"kubernetes.io/projected/a20a9afb-aaf8-47db-b1f6-876f7849a154-kube-api-access-tx6d2\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.050699 kubelet[2023]: I1213 14:09:34.050588 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9e54fc8c-4579-4b2f-a627-7560b366e192-varrun\") pod \"csi-node-driver-vhlnb\" (UID: \"9e54fc8c-4579-4b2f-a627-7560b366e192\") " pod="calico-system/csi-node-driver-vhlnb" Dec 13 14:09:34.050816 kubelet[2023]: I1213 14:09:34.050605 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a20a9afb-aaf8-47db-b1f6-876f7849a154-cni-net-dir\") pod \"calico-node-bd6gg\" (UID: \"a20a9afb-aaf8-47db-b1f6-876f7849a154\") " pod="calico-system/calico-node-bd6gg" Dec 13 14:09:34.152831 kubelet[2023]: E1213 14:09:34.152802 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.152998 kubelet[2023]: W1213 14:09:34.152983 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.153119 kubelet[2023]: E1213 14:09:34.153084 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.153328 kubelet[2023]: E1213 14:09:34.153314 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.153400 kubelet[2023]: W1213 14:09:34.153388 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.153493 kubelet[2023]: E1213 14:09:34.153473 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.153713 kubelet[2023]: E1213 14:09:34.153701 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.153794 kubelet[2023]: W1213 14:09:34.153781 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.153879 kubelet[2023]: E1213 14:09:34.153858 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.154091 kubelet[2023]: E1213 14:09:34.154078 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.154169 kubelet[2023]: W1213 14:09:34.154157 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.154252 kubelet[2023]: E1213 14:09:34.154231 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.154462 kubelet[2023]: E1213 14:09:34.154450 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.154536 kubelet[2023]: W1213 14:09:34.154524 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.154621 kubelet[2023]: E1213 14:09:34.154600 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.154842 kubelet[2023]: E1213 14:09:34.154829 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.154922 kubelet[2023]: W1213 14:09:34.154910 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.155003 kubelet[2023]: E1213 14:09:34.154982 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.155223 kubelet[2023]: E1213 14:09:34.155210 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.155301 kubelet[2023]: W1213 14:09:34.155289 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.155393 kubelet[2023]: E1213 14:09:34.155373 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.155590 kubelet[2023]: E1213 14:09:34.155577 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.155679 kubelet[2023]: W1213 14:09:34.155666 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.155765 kubelet[2023]: E1213 14:09:34.155746 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.155980 kubelet[2023]: E1213 14:09:34.155967 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.156054 kubelet[2023]: W1213 14:09:34.156042 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.156141 kubelet[2023]: E1213 14:09:34.156122 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.156356 kubelet[2023]: E1213 14:09:34.156344 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.156428 kubelet[2023]: W1213 14:09:34.156416 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.156557 kubelet[2023]: E1213 14:09:34.156538 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.156733 kubelet[2023]: E1213 14:09:34.156720 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.156810 kubelet[2023]: W1213 14:09:34.156798 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.156895 kubelet[2023]: E1213 14:09:34.156876 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.157104 kubelet[2023]: E1213 14:09:34.157090 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.157179 kubelet[2023]: W1213 14:09:34.157167 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.157262 kubelet[2023]: E1213 14:09:34.157242 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.157460 kubelet[2023]: E1213 14:09:34.157448 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.157539 kubelet[2023]: W1213 14:09:34.157528 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.157623 kubelet[2023]: E1213 14:09:34.157605 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.157880 kubelet[2023]: E1213 14:09:34.157868 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.157958 kubelet[2023]: W1213 14:09:34.157946 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.158041 kubelet[2023]: E1213 14:09:34.158021 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.158246 kubelet[2023]: E1213 14:09:34.158233 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.158320 kubelet[2023]: W1213 14:09:34.158308 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.158405 kubelet[2023]: E1213 14:09:34.158385 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.159109 kubelet[2023]: E1213 14:09:34.159096 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.159195 kubelet[2023]: W1213 14:09:34.159181 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.159428 kubelet[2023]: E1213 14:09:34.159415 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.159506 kubelet[2023]: W1213 14:09:34.159495 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.159755 kubelet[2023]: E1213 14:09:34.159742 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.159844 kubelet[2023]: W1213 14:09:34.159832 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.160081 kubelet[2023]: E1213 14:09:34.160067 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.160171 kubelet[2023]: W1213 14:09:34.160159 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.160419 kubelet[2023]: E1213 14:09:34.160406 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.160499 kubelet[2023]: W1213 14:09:34.160488 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.160559 kubelet[2023]: E1213 14:09:34.160548 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.169331 kubelet[2023]: E1213 14:09:34.167372 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.169331 kubelet[2023]: E1213 14:09:34.167470 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.169331 kubelet[2023]: E1213 14:09:34.167675 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.169331 kubelet[2023]: E1213 14:09:34.168077 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.169895 kubelet[2023]: E1213 14:09:34.169851 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.169895 kubelet[2023]: W1213 14:09:34.169864 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.169895 kubelet[2023]: E1213 14:09:34.169880 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.170638 kubelet[2023]: E1213 14:09:34.170609 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.170638 kubelet[2023]: W1213 14:09:34.170628 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.170638 kubelet[2023]: E1213 14:09:34.170680 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.174803 kubelet[2023]: E1213 14:09:34.173518 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.174803 kubelet[2023]: W1213 14:09:34.173536 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.174803 kubelet[2023]: E1213 14:09:34.173561 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.174803 kubelet[2023]: E1213 14:09:34.174187 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.174803 kubelet[2023]: W1213 14:09:34.174197 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.174803 kubelet[2023]: E1213 14:09:34.174217 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.176672 kubelet[2023]: E1213 14:09:34.176630 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.176790 kubelet[2023]: W1213 14:09:34.176778 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.176870 kubelet[2023]: E1213 14:09:34.176859 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.182072 kubelet[2023]: E1213 14:09:34.182058 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:34.182170 kubelet[2023]: W1213 14:09:34.182158 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:34.182243 kubelet[2023]: E1213 14:09:34.182232 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:34.349391 env[1478]: time="2024-12-13T14:09:34.346095781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bd6gg,Uid:a20a9afb-aaf8-47db-b1f6-876f7849a154,Namespace:calico-system,Attempt:0,}" Dec 13 14:09:34.352689 env[1478]: time="2024-12-13T14:09:34.352546002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-q9gfd,Uid:bfe1516d-cc75-4943-8bc5-0a75df785c1d,Namespace:kube-system,Attempt:0,}" Dec 13 14:09:35.025211 kubelet[2023]: E1213 14:09:35.025183 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:35.232424 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4255431963.mount: Deactivated successfully. Dec 13 14:09:35.254261 env[1478]: time="2024-12-13T14:09:35.254216391Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:35.264312 env[1478]: time="2024-12-13T14:09:35.264274223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:35.268068 env[1478]: time="2024-12-13T14:09:35.268033614Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:35.275173 env[1478]: time="2024-12-13T14:09:35.275137056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:35.279542 env[1478]: time="2024-12-13T14:09:35.279125779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:35.283053 env[1478]: time="2024-12-13T14:09:35.283018257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:35.291737 env[1478]: time="2024-12-13T14:09:35.291714219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:35.292418 env[1478]: time="2024-12-13T14:09:35.292398254Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:35.329028 kubelet[2023]: E1213 14:09:35.328955 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vhlnb" podUID="9e54fc8c-4579-4b2f-a627-7560b366e192" Dec 13 14:09:35.356982 env[1478]: time="2024-12-13T14:09:35.356867176Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:09:35.356982 env[1478]: time="2024-12-13T14:09:35.356909978Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:09:35.356982 env[1478]: time="2024-12-13T14:09:35.356920538Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:09:35.357319 env[1478]: time="2024-12-13T14:09:35.357273156Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19e1229fd87778a3887d8f56b58cc8290581bd57b215033ae55b6693ab091920 pid=2098 runtime=io.containerd.runc.v2 Dec 13 14:09:35.357847 env[1478]: time="2024-12-13T14:09:35.357789582Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:09:35.357847 env[1478]: time="2024-12-13T14:09:35.357820184Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:09:35.357847 env[1478]: time="2024-12-13T14:09:35.357829745Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:09:35.358137 env[1478]: time="2024-12-13T14:09:35.358095118Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6516d751423395fc7fce82b47cac5e0d0f4b100cf44eefbff98cd0bcc0792fc2 pid=2101 runtime=io.containerd.runc.v2 Dec 13 14:09:35.374544 systemd[1]: Started cri-containerd-6516d751423395fc7fce82b47cac5e0d0f4b100cf44eefbff98cd0bcc0792fc2.scope. Dec 13 14:09:35.377535 systemd[1]: Started cri-containerd-19e1229fd87778a3887d8f56b58cc8290581bd57b215033ae55b6693ab091920.scope. Dec 13 14:09:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.389000 audit: BPF prog-id=62 op=LOAD Dec 13 14:09:35.389000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.389000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2101 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313664373531343233333935666337666365383262343763616335 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2101 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313664373531343233333935666337666365383262343763616335 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.390000 audit: BPF prog-id=63 op=LOAD Dec 13 14:09:35.390000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2101 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313664373531343233333935666337666365383262343763616335 Dec 13 14:09:35.391000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.391000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.391000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.391000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.391000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.391000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.391000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.391000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.391000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.391000 audit: BPF prog-id=64 op=LOAD Dec 13 14:09:35.391000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2101 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313664373531343233333935666337666365383262343763616335 Dec 13 14:09:35.391000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:09:35.391000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.392000 audit: BPF prog-id=65 op=LOAD Dec 13 14:09:35.392000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2101 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313664373531343233333935666337666365383262343763616335 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.400000 audit: BPF prog-id=66 op=LOAD Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2098 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653132323966643837373738613338383764386635366235386363 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2098 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653132323966643837373738613338383764386635366235386363 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit: BPF prog-id=67 op=LOAD Dec 13 14:09:35.401000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2098 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653132323966643837373738613338383764386635366235386363 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit: BPF prog-id=68 op=LOAD Dec 13 14:09:35.401000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2098 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653132323966643837373738613338383764386635366235386363 Dec 13 14:09:35.401000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:09:35.401000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:35.401000 audit: BPF prog-id=69 op=LOAD Dec 13 14:09:35.401000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2098 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:35.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653132323966643837373738613338383764386635366235386363 Dec 13 14:09:35.414504 env[1478]: time="2024-12-13T14:09:35.414457947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-q9gfd,Uid:bfe1516d-cc75-4943-8bc5-0a75df785c1d,Namespace:kube-system,Attempt:0,} returns sandbox id \"6516d751423395fc7fce82b47cac5e0d0f4b100cf44eefbff98cd0bcc0792fc2\"" Dec 13 14:09:35.417171 env[1478]: time="2024-12-13T14:09:35.417140963Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:09:35.422864 env[1478]: time="2024-12-13T14:09:35.422827733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bd6gg,Uid:a20a9afb-aaf8-47db-b1f6-876f7849a154,Namespace:calico-system,Attempt:0,} returns sandbox id \"19e1229fd87778a3887d8f56b58cc8290581bd57b215033ae55b6693ab091920\"" Dec 13 14:09:36.025822 kubelet[2023]: E1213 14:09:36.025781 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:36.686739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount32702185.mount: Deactivated successfully. Dec 13 14:09:37.026206 kubelet[2023]: E1213 14:09:37.026140 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:37.145378 env[1478]: time="2024-12-13T14:09:37.145318763Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:37.155110 env[1478]: time="2024-12-13T14:09:37.155066546Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:37.158219 env[1478]: time="2024-12-13T14:09:37.158184374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:37.161839 env[1478]: time="2024-12-13T14:09:37.161814506Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:37.162216 env[1478]: time="2024-12-13T14:09:37.162191244Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb\"" Dec 13 14:09:37.163983 env[1478]: time="2024-12-13T14:09:37.163954688Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:09:37.165119 env[1478]: time="2024-12-13T14:09:37.165089102Z" level=info msg="CreateContainer within sandbox \"6516d751423395fc7fce82b47cac5e0d0f4b100cf44eefbff98cd0bcc0792fc2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:09:37.191094 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2356121329.mount: Deactivated successfully. Dec 13 14:09:37.206684 env[1478]: time="2024-12-13T14:09:37.206599554Z" level=info msg="CreateContainer within sandbox \"6516d751423395fc7fce82b47cac5e0d0f4b100cf44eefbff98cd0bcc0792fc2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"de869e62ebc7195f19c88ed1a80f403c92366078564229f4b359c3c2004e1599\"" Dec 13 14:09:37.207606 env[1478]: time="2024-12-13T14:09:37.207582200Z" level=info msg="StartContainer for \"de869e62ebc7195f19c88ed1a80f403c92366078564229f4b359c3c2004e1599\"" Dec 13 14:09:37.222068 systemd[1]: Started cri-containerd-de869e62ebc7195f19c88ed1a80f403c92366078564229f4b359c3c2004e1599.scope. Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.247023 kernel: kauditd_printk_skb: 336 callbacks suppressed Dec 13 14:09:37.247096 kernel: audit: type=1400 audit(1734098977.239:474): avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit[2172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2101 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.291355 kernel: audit: type=1300 audit(1734098977.239:474): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2101 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383639653632656263373139356631396338386564316138306634 Dec 13 14:09:37.315792 kernel: audit: type=1327 audit(1734098977.239:474): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383639653632656263373139356631396338386564316138306634 Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.328730 kubelet[2023]: E1213 14:09:37.328353 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vhlnb" podUID="9e54fc8c-4579-4b2f-a627-7560b366e192" Dec 13 14:09:37.333237 kernel: audit: type=1400 audit(1734098977.239:475): avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.350527 kernel: audit: type=1400 audit(1734098977.239:475): avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.369551 kernel: audit: type=1400 audit(1734098977.239:475): avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.390224 kernel: audit: type=1400 audit(1734098977.239:475): avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.390351 kernel: audit: type=1400 audit(1734098977.239:475): avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.425524 kernel: audit: type=1400 audit(1734098977.239:475): avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.444179 kernel: audit: type=1400 audit(1734098977.239:475): avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.444758 env[1478]: time="2024-12-13T14:09:37.444706863Z" level=info msg="StartContainer for \"de869e62ebc7195f19c88ed1a80f403c92366078564229f4b359c3c2004e1599\" returns successfully" Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.239000 audit: BPF prog-id=70 op=LOAD Dec 13 14:09:37.239000 audit[2172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2101 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383639653632656263373139356631396338386564316138306634 Dec 13 14:09:37.245000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.245000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.245000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.245000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.245000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.245000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.245000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.245000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.245000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.245000 audit: BPF prog-id=71 op=LOAD Dec 13 14:09:37.245000 audit[2172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2101 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383639653632656263373139356631396338386564316138306634 Dec 13 14:09:37.263000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:09:37.263000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:37.263000 audit: BPF prog-id=72 op=LOAD Dec 13 14:09:37.263000 audit[2172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2101 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383639653632656263373139356631396338386564316138306634 Dec 13 14:09:37.464000 audit[2222]: NETFILTER_CFG table=mangle:20 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.464000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe30f1db0 a2=0 a3=1 items=0 ppid=2183 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:09:37.464000 audit[2223]: NETFILTER_CFG table=mangle:21 family=10 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.464000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5fd6160 a2=0 a3=1 items=0 ppid=2183 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:09:37.465000 audit[2224]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.465000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe891bcf0 a2=0 a3=1 items=0 ppid=2183 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:09:37.466000 audit[2225]: NETFILTER_CFG table=filter:23 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.466000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca277050 a2=0 a3=1 items=0 ppid=2183 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:09:37.467000 audit[2226]: NETFILTER_CFG table=nat:24 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.467000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe7dc2280 a2=0 a3=1 items=0 ppid=2183 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:09:37.468000 audit[2227]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.468000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd2ae4520 a2=0 a3=1 items=0 ppid=2183 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:09:37.565000 audit[2228]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.565000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffc2a5ec0 a2=0 a3=1 items=0 ppid=2183 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:09:37.569000 audit[2230]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.569000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff46e2d40 a2=0 a3=1 items=0 ppid=2183 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:09:37.574000 audit[2233]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.574000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5c04490 a2=0 a3=1 items=0 ppid=2183 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:09:37.575000 audit[2234]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.575000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe69264a0 a2=0 a3=1 items=0 ppid=2183 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:09:37.578000 audit[2236]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.578000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd8b00660 a2=0 a3=1 items=0 ppid=2183 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:09:37.579000 audit[2237]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.579000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef02f420 a2=0 a3=1 items=0 ppid=2183 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:09:37.581000 audit[2239]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.581000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffece73460 a2=0 a3=1 items=0 ppid=2183 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:09:37.584000 audit[2242]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.584000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd881db20 a2=0 a3=1 items=0 ppid=2183 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:09:37.585000 audit[2243]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.585000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd04e34e0 a2=0 a3=1 items=0 ppid=2183 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:09:37.587000 audit[2245]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.587000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd6f42880 a2=0 a3=1 items=0 ppid=2183 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:09:37.588000 audit[2246]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.588000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1d39520 a2=0 a3=1 items=0 ppid=2183 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.588000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:09:37.591000 audit[2248]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.591000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd1be5e70 a2=0 a3=1 items=0 ppid=2183 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:09:37.594000 audit[2251]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.594000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc45911d0 a2=0 a3=1 items=0 ppid=2183 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:09:37.598000 audit[2254]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.598000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffff910e20 a2=0 a3=1 items=0 ppid=2183 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:09:37.599000 audit[2255]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.599000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc09b5f40 a2=0 a3=1 items=0 ppid=2183 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:09:37.601000 audit[2257]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.601000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc1b2e360 a2=0 a3=1 items=0 ppid=2183 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:09:37.673000 audit[2262]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.673000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffecdb40c0 a2=0 a3=1 items=0 ppid=2183 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:09:37.674000 audit[2263]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.674000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1b607a0 a2=0 a3=1 items=0 ppid=2183 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:09:37.676000 audit[2265]: NETFILTER_CFG table=nat:44 family=2 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:09:37.676000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe95c16d0 a2=0 a3=1 items=0 ppid=2183 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:09:37.708000 audit[2271]: NETFILTER_CFG table=filter:45 family=2 entries=5 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:09:37.708000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcb423990 a2=0 a3=1 items=0 ppid=2183 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:37.762000 audit[2271]: NETFILTER_CFG table=nat:46 family=2 entries=65 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:09:37.762000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffcb423990 a2=0 a3=1 items=0 ppid=2183 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:37.804000 audit[2279]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.804000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe6620180 a2=0 a3=1 items=0 ppid=2183 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:09:37.806000 audit[2281]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.806000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc5b633c0 a2=0 a3=1 items=0 ppid=2183 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:09:37.809000 audit[2284]: NETFILTER_CFG table=filter:49 family=10 entries=2 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.809000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc16a6310 a2=0 a3=1 items=0 ppid=2183 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.809000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:09:37.810000 audit[2285]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.810000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc52b62d0 a2=0 a3=1 items=0 ppid=2183 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:09:37.812000 audit[2287]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.812000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcbf5dc50 a2=0 a3=1 items=0 ppid=2183 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:09:37.813000 audit[2288]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.813000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc99a98d0 a2=0 a3=1 items=0 ppid=2183 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.813000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:09:37.816000 audit[2290]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.816000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffa4528c0 a2=0 a3=1 items=0 ppid=2183 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:09:37.821000 audit[2293]: NETFILTER_CFG table=filter:54 family=10 entries=2 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.821000 audit[2293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd5eb2370 a2=0 a3=1 items=0 ppid=2183 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:09:37.822000 audit[2294]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.822000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf127410 a2=0 a3=1 items=0 ppid=2183 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:09:37.824000 audit[2296]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.824000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc5284540 a2=0 a3=1 items=0 ppid=2183 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:09:37.825000 audit[2297]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.825000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea640ea0 a2=0 a3=1 items=0 ppid=2183 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:09:37.827000 audit[2299]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.827000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff2fc0750 a2=0 a3=1 items=0 ppid=2183 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:09:37.830000 audit[2302]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.830000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff00e9f40 a2=0 a3=1 items=0 ppid=2183 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:09:37.833000 audit[2305]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.833000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff40c7ae0 a2=0 a3=1 items=0 ppid=2183 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:09:37.834000 audit[2306]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.834000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe4bb1ed0 a2=0 a3=1 items=0 ppid=2183 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:09:37.836000 audit[2308]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.836000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc20ffa40 a2=0 a3=1 items=0 ppid=2183 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:09:37.839000 audit[2311]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.839000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd764e5e0 a2=0 a3=1 items=0 ppid=2183 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:09:37.840000 audit[2312]: NETFILTER_CFG table=nat:64 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.840000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed8d4610 a2=0 a3=1 items=0 ppid=2183 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:09:37.842000 audit[2314]: NETFILTER_CFG table=nat:65 family=10 entries=2 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.842000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffde83e820 a2=0 a3=1 items=0 ppid=2183 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:09:37.843000 audit[2315]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.843000 audit[2315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2594480 a2=0 a3=1 items=0 ppid=2183 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:09:37.845000 audit[2317]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.845000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff7178ac0 a2=0 a3=1 items=0 ppid=2183 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:09:37.848000 audit[2320]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:09:37.848000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe032d960 a2=0 a3=1 items=0 ppid=2183 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:09:37.851000 audit[2322]: NETFILTER_CFG table=filter:69 family=10 entries=3 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:09:37.851000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffff8d12af0 a2=0 a3=1 items=0 ppid=2183 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.851000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:37.851000 audit[2322]: NETFILTER_CFG table=nat:70 family=10 entries=7 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:09:37.851000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff8d12af0 a2=0 a3=1 items=0 ppid=2183 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:37.851000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:38.027219 kubelet[2023]: E1213 14:09:38.027176 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:38.320103 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1366660880.mount: Deactivated successfully. Dec 13 14:09:38.355164 kubelet[2023]: I1213 14:09:38.355020 2023 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-q9gfd" podStartSLOduration=4.608252352 podStartE2EDuration="6.355005157s" podCreationTimestamp="2024-12-13 14:09:32 +0000 UTC" firstStartedPulling="2024-12-13 14:09:35.416335562 +0000 UTC m=+4.320208526" lastFinishedPulling="2024-12-13 14:09:37.163088367 +0000 UTC m=+6.066961331" observedRunningTime="2024-12-13 14:09:38.354932114 +0000 UTC m=+7.258805038" watchObservedRunningTime="2024-12-13 14:09:38.355005157 +0000 UTC m=+7.258878121" Dec 13 14:09:38.371676 kubelet[2023]: E1213 14:09:38.371602 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.371676 kubelet[2023]: W1213 14:09:38.371624 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.371676 kubelet[2023]: E1213 14:09:38.371642 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.371857 kubelet[2023]: E1213 14:09:38.371809 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.371857 kubelet[2023]: W1213 14:09:38.371817 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.371857 kubelet[2023]: E1213 14:09:38.371826 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.372071 kubelet[2023]: E1213 14:09:38.372048 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.372071 kubelet[2023]: W1213 14:09:38.372067 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.372143 kubelet[2023]: E1213 14:09:38.372079 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.372257 kubelet[2023]: E1213 14:09:38.372234 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.372257 kubelet[2023]: W1213 14:09:38.372249 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.372311 kubelet[2023]: E1213 14:09:38.372258 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.372456 kubelet[2023]: E1213 14:09:38.372438 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.372506 kubelet[2023]: W1213 14:09:38.372455 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.372506 kubelet[2023]: E1213 14:09:38.372466 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.372621 kubelet[2023]: E1213 14:09:38.372603 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.372621 kubelet[2023]: W1213 14:09:38.372617 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.372702 kubelet[2023]: E1213 14:09:38.372628 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.372848 kubelet[2023]: E1213 14:09:38.372830 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.372903 kubelet[2023]: W1213 14:09:38.372849 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.372903 kubelet[2023]: E1213 14:09:38.372858 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.373015 kubelet[2023]: E1213 14:09:38.372996 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.373015 kubelet[2023]: W1213 14:09:38.373011 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.373076 kubelet[2023]: E1213 14:09:38.373019 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.373214 kubelet[2023]: E1213 14:09:38.373197 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.373214 kubelet[2023]: W1213 14:09:38.373212 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.373285 kubelet[2023]: E1213 14:09:38.373221 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.373373 kubelet[2023]: E1213 14:09:38.373356 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.373373 kubelet[2023]: W1213 14:09:38.373370 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.373432 kubelet[2023]: E1213 14:09:38.373379 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.373571 kubelet[2023]: E1213 14:09:38.373554 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.373571 kubelet[2023]: W1213 14:09:38.373569 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.373642 kubelet[2023]: E1213 14:09:38.373578 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.373747 kubelet[2023]: E1213 14:09:38.373730 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.373747 kubelet[2023]: W1213 14:09:38.373743 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.373809 kubelet[2023]: E1213 14:09:38.373753 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.373942 kubelet[2023]: E1213 14:09:38.373927 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.373942 kubelet[2023]: W1213 14:09:38.373940 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.374013 kubelet[2023]: E1213 14:09:38.373948 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.374080 kubelet[2023]: E1213 14:09:38.374074 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.374104 kubelet[2023]: W1213 14:09:38.374081 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.374104 kubelet[2023]: E1213 14:09:38.374088 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.374272 kubelet[2023]: E1213 14:09:38.374252 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.374272 kubelet[2023]: W1213 14:09:38.374268 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.374346 kubelet[2023]: E1213 14:09:38.374276 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.374428 kubelet[2023]: E1213 14:09:38.374409 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.374428 kubelet[2023]: W1213 14:09:38.374423 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.374486 kubelet[2023]: E1213 14:09:38.374432 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.374637 kubelet[2023]: E1213 14:09:38.374619 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.374637 kubelet[2023]: W1213 14:09:38.374635 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.374728 kubelet[2023]: E1213 14:09:38.374653 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.374839 kubelet[2023]: E1213 14:09:38.374811 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.374839 kubelet[2023]: W1213 14:09:38.374826 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.374839 kubelet[2023]: E1213 14:09:38.374834 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.375043 kubelet[2023]: E1213 14:09:38.375024 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.375043 kubelet[2023]: W1213 14:09:38.375041 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.375120 kubelet[2023]: E1213 14:09:38.375051 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.375202 kubelet[2023]: E1213 14:09:38.375184 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.375202 kubelet[2023]: W1213 14:09:38.375198 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.375262 kubelet[2023]: E1213 14:09:38.375206 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.414620 kubelet[2023]: E1213 14:09:38.414586 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.414620 kubelet[2023]: W1213 14:09:38.414610 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.414748 kubelet[2023]: E1213 14:09:38.414629 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.414845 kubelet[2023]: E1213 14:09:38.414829 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.414881 kubelet[2023]: W1213 14:09:38.414846 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.414881 kubelet[2023]: E1213 14:09:38.414859 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.415072 kubelet[2023]: E1213 14:09:38.415055 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.415072 kubelet[2023]: W1213 14:09:38.415070 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.415143 kubelet[2023]: E1213 14:09:38.415085 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.415244 kubelet[2023]: E1213 14:09:38.415222 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.415244 kubelet[2023]: W1213 14:09:38.415236 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.415302 kubelet[2023]: E1213 14:09:38.415245 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.415445 kubelet[2023]: E1213 14:09:38.415430 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.415445 kubelet[2023]: W1213 14:09:38.415443 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.415518 kubelet[2023]: E1213 14:09:38.415455 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.415656 kubelet[2023]: E1213 14:09:38.415627 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.415656 kubelet[2023]: W1213 14:09:38.415641 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.415711 kubelet[2023]: E1213 14:09:38.415665 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.416086 kubelet[2023]: E1213 14:09:38.415914 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.416086 kubelet[2023]: W1213 14:09:38.415930 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.416086 kubelet[2023]: E1213 14:09:38.415947 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.416402 kubelet[2023]: E1213 14:09:38.416234 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.416402 kubelet[2023]: W1213 14:09:38.416248 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.416402 kubelet[2023]: E1213 14:09:38.416266 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.416737 kubelet[2023]: E1213 14:09:38.416534 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.416737 kubelet[2023]: W1213 14:09:38.416547 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.416737 kubelet[2023]: E1213 14:09:38.416565 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.417104 kubelet[2023]: E1213 14:09:38.416877 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.417104 kubelet[2023]: W1213 14:09:38.416891 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.417104 kubelet[2023]: E1213 14:09:38.416910 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.417215 kubelet[2023]: E1213 14:09:38.417136 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.417215 kubelet[2023]: W1213 14:09:38.417147 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.417215 kubelet[2023]: E1213 14:09:38.417163 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.417420 kubelet[2023]: E1213 14:09:38.417403 2023 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:09:38.417420 kubelet[2023]: W1213 14:09:38.417418 2023 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:09:38.417487 kubelet[2023]: E1213 14:09:38.417431 2023 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:09:38.478235 env[1478]: time="2024-12-13T14:09:38.478186378Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:38.484783 env[1478]: time="2024-12-13T14:09:38.484736639Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:38.487926 env[1478]: time="2024-12-13T14:09:38.487898704Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:38.490964 env[1478]: time="2024-12-13T14:09:38.490937684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:38.491312 env[1478]: time="2024-12-13T14:09:38.491282260Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:09:38.493981 env[1478]: time="2024-12-13T14:09:38.493943662Z" level=info msg="CreateContainer within sandbox \"19e1229fd87778a3887d8f56b58cc8290581bd57b215033ae55b6693ab091920\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:09:38.531297 env[1478]: time="2024-12-13T14:09:38.531245096Z" level=info msg="CreateContainer within sandbox \"19e1229fd87778a3887d8f56b58cc8290581bd57b215033ae55b6693ab091920\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d768f1ae8750d6eed4d0c3a3379d333ed0340d64de89e77c01922fbe0d46427f\"" Dec 13 14:09:38.531939 env[1478]: time="2024-12-13T14:09:38.531911767Z" level=info msg="StartContainer for \"d768f1ae8750d6eed4d0c3a3379d333ed0340d64de89e77c01922fbe0d46427f\"" Dec 13 14:09:38.551519 systemd[1]: Started cri-containerd-d768f1ae8750d6eed4d0c3a3379d333ed0340d64de89e77c01922fbe0d46427f.scope. Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2098 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:38.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363866316165383735306436656564346430633361333337396433 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit: BPF prog-id=73 op=LOAD Dec 13 14:09:38.563000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2098 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:38.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363866316165383735306436656564346430633361333337396433 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit: BPF prog-id=74 op=LOAD Dec 13 14:09:38.563000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2098 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:38.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363866316165383735306436656564346430633361333337396433 Dec 13 14:09:38.563000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:09:38.563000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:38.563000 audit: BPF prog-id=75 op=LOAD Dec 13 14:09:38.563000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2098 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:38.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363866316165383735306436656564346430633361333337396433 Dec 13 14:09:38.583726 env[1478]: time="2024-12-13T14:09:38.582968953Z" level=info msg="StartContainer for \"d768f1ae8750d6eed4d0c3a3379d333ed0340d64de89e77c01922fbe0d46427f\" returns successfully" Dec 13 14:09:38.590483 systemd[1]: cri-containerd-d768f1ae8750d6eed4d0c3a3379d333ed0340d64de89e77c01922fbe0d46427f.scope: Deactivated successfully. Dec 13 14:09:38.594000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:09:39.027906 kubelet[2023]: E1213 14:09:39.027852 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:39.288521 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d768f1ae8750d6eed4d0c3a3379d333ed0340d64de89e77c01922fbe0d46427f-rootfs.mount: Deactivated successfully. Dec 13 14:09:39.296773 env[1478]: time="2024-12-13T14:09:39.296723609Z" level=info msg="shim disconnected" id=d768f1ae8750d6eed4d0c3a3379d333ed0340d64de89e77c01922fbe0d46427f Dec 13 14:09:39.296985 env[1478]: time="2024-12-13T14:09:39.296967499Z" level=warning msg="cleaning up after shim disconnected" id=d768f1ae8750d6eed4d0c3a3379d333ed0340d64de89e77c01922fbe0d46427f namespace=k8s.io Dec 13 14:09:39.297078 env[1478]: time="2024-12-13T14:09:39.297065104Z" level=info msg="cleaning up dead shim" Dec 13 14:09:39.303979 env[1478]: time="2024-12-13T14:09:39.303940490Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:09:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2401 runtime=io.containerd.runc.v2\n" Dec 13 14:09:39.328677 kubelet[2023]: E1213 14:09:39.328393 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vhlnb" podUID="9e54fc8c-4579-4b2f-a627-7560b366e192" Dec 13 14:09:39.343317 env[1478]: time="2024-12-13T14:09:39.343285641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:09:40.028848 kubelet[2023]: E1213 14:09:40.028820 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:41.030033 kubelet[2023]: E1213 14:09:41.029982 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:41.328992 kubelet[2023]: E1213 14:09:41.328634 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vhlnb" podUID="9e54fc8c-4579-4b2f-a627-7560b366e192" Dec 13 14:09:42.031009 kubelet[2023]: E1213 14:09:42.030972 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:42.654010 env[1478]: time="2024-12-13T14:09:42.653969122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:42.663775 env[1478]: time="2024-12-13T14:09:42.663749800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:42.667327 env[1478]: time="2024-12-13T14:09:42.667305505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:42.672856 env[1478]: time="2024-12-13T14:09:42.672833730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:42.673457 env[1478]: time="2024-12-13T14:09:42.673433634Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:09:42.675823 env[1478]: time="2024-12-13T14:09:42.675797010Z" level=info msg="CreateContainer within sandbox \"19e1229fd87778a3887d8f56b58cc8290581bd57b215033ae55b6693ab091920\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:09:42.702512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1874165640.mount: Deactivated successfully. Dec 13 14:09:42.720933 env[1478]: time="2024-12-13T14:09:42.720880925Z" level=info msg="CreateContainer within sandbox \"19e1229fd87778a3887d8f56b58cc8290581bd57b215033ae55b6693ab091920\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b71741df39c58d43d1c4a349ee966f48496a94dce06870082a0dc50a941361ab\"" Dec 13 14:09:42.721802 env[1478]: time="2024-12-13T14:09:42.721772961Z" level=info msg="StartContainer for \"b71741df39c58d43d1c4a349ee966f48496a94dce06870082a0dc50a941361ab\"" Dec 13 14:09:42.740459 systemd[1]: Started cri-containerd-b71741df39c58d43d1c4a349ee966f48496a94dce06870082a0dc50a941361ab.scope. Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.764463 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:09:42.764561 kernel: audit: type=1400 audit(1734098982.758:538): avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2098 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:42.810301 kernel: audit: type=1300 audit(1734098982.758:538): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2098 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313734316466333963353864343364316334613334396565393636 Dec 13 14:09:42.834474 kernel: audit: type=1327 audit(1734098982.758:538): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313734316466333963353864343364316334613334396565393636 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.851314 kernel: audit: type=1400 audit(1734098982.758:539): avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.868354 kernel: audit: type=1400 audit(1734098982.758:539): avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.885682 kernel: audit: type=1400 audit(1734098982.758:539): avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.903702 kernel: audit: type=1400 audit(1734098982.758:539): avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.922200 kernel: audit: type=1400 audit(1734098982.758:539): avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.939703 kernel: audit: type=1400 audit(1734098982.758:539): avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.956885 kernel: audit: type=1400 audit(1734098982.758:539): avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit: BPF prog-id=76 op=LOAD Dec 13 14:09:42.758000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2098 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313734316466333963353864343364316334613334396565393636 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit: BPF prog-id=77 op=LOAD Dec 13 14:09:42.758000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2098 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313734316466333963353864343364316334613334396565393636 Dec 13 14:09:42.758000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:09:42.758000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:42.758000 audit: BPF prog-id=78 op=LOAD Dec 13 14:09:42.758000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2098 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237313734316466333963353864343364316334613334396565393636 Dec 13 14:09:42.959004 env[1478]: time="2024-12-13T14:09:42.958561236Z" level=info msg="StartContainer for \"b71741df39c58d43d1c4a349ee966f48496a94dce06870082a0dc50a941361ab\" returns successfully" Dec 13 14:09:43.031943 kubelet[2023]: E1213 14:09:43.031904 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:43.328991 kubelet[2023]: E1213 14:09:43.328667 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vhlnb" podUID="9e54fc8c-4579-4b2f-a627-7560b366e192" Dec 13 14:09:44.032878 kubelet[2023]: E1213 14:09:44.032737 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:44.089183 env[1478]: time="2024-12-13T14:09:44.089132011Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:09:44.091729 systemd[1]: cri-containerd-b71741df39c58d43d1c4a349ee966f48496a94dce06870082a0dc50a941361ab.scope: Deactivated successfully. Dec 13 14:09:44.096000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:09:44.108261 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b71741df39c58d43d1c4a349ee966f48496a94dce06870082a0dc50a941361ab-rootfs.mount: Deactivated successfully. Dec 13 14:09:44.158099 kubelet[2023]: I1213 14:09:44.157236 2023 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:09:45.033739 kubelet[2023]: E1213 14:09:45.033705 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:45.267547 env[1478]: time="2024-12-13T14:09:45.267497508Z" level=info msg="shim disconnected" id=b71741df39c58d43d1c4a349ee966f48496a94dce06870082a0dc50a941361ab Dec 13 14:09:45.267547 env[1478]: time="2024-12-13T14:09:45.267540590Z" level=warning msg="cleaning up after shim disconnected" id=b71741df39c58d43d1c4a349ee966f48496a94dce06870082a0dc50a941361ab namespace=k8s.io Dec 13 14:09:45.267547 env[1478]: time="2024-12-13T14:09:45.267550270Z" level=info msg="cleaning up dead shim" Dec 13 14:09:45.274393 env[1478]: time="2024-12-13T14:09:45.274347365Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:09:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2464 runtime=io.containerd.runc.v2\n" Dec 13 14:09:45.332422 systemd[1]: Created slice kubepods-besteffort-pod9e54fc8c_4579_4b2f_a627_7560b366e192.slice. Dec 13 14:09:45.335041 env[1478]: time="2024-12-13T14:09:45.335008283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vhlnb,Uid:9e54fc8c-4579-4b2f-a627-7560b366e192,Namespace:calico-system,Attempt:0,}" Dec 13 14:09:45.354487 env[1478]: time="2024-12-13T14:09:45.354446053Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:09:45.420640 env[1478]: time="2024-12-13T14:09:45.420580776Z" level=error msg="Failed to destroy network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:45.422268 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990-shm.mount: Deactivated successfully. Dec 13 14:09:45.423147 env[1478]: time="2024-12-13T14:09:45.423112711Z" level=error msg="encountered an error cleaning up failed sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:45.423299 env[1478]: time="2024-12-13T14:09:45.423270797Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vhlnb,Uid:9e54fc8c-4579-4b2f-a627-7560b366e192,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:45.423582 kubelet[2023]: E1213 14:09:45.423542 2023 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:45.423680 kubelet[2023]: E1213 14:09:45.423605 2023 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vhlnb" Dec 13 14:09:45.423680 kubelet[2023]: E1213 14:09:45.423626 2023 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vhlnb" Dec 13 14:09:45.423745 kubelet[2023]: E1213 14:09:45.423677 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vhlnb_calico-system(9e54fc8c-4579-4b2f-a627-7560b366e192)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vhlnb_calico-system(9e54fc8c-4579-4b2f-a627-7560b366e192)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vhlnb" podUID="9e54fc8c-4579-4b2f-a627-7560b366e192" Dec 13 14:09:46.034418 kubelet[2023]: E1213 14:09:46.034363 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:46.355752 kubelet[2023]: I1213 14:09:46.355317 2023 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:09:46.356331 env[1478]: time="2024-12-13T14:09:46.356294581Z" level=info msg="StopPodSandbox for \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\"" Dec 13 14:09:46.380746 env[1478]: time="2024-12-13T14:09:46.380690994Z" level=error msg="StopPodSandbox for \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\" failed" error="failed to destroy network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:46.381250 kubelet[2023]: E1213 14:09:46.381084 2023 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:09:46.381250 kubelet[2023]: E1213 14:09:46.381138 2023 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990"} Dec 13 14:09:46.381250 kubelet[2023]: E1213 14:09:46.381198 2023 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9e54fc8c-4579-4b2f-a627-7560b366e192\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:09:46.381250 kubelet[2023]: E1213 14:09:46.381221 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9e54fc8c-4579-4b2f-a627-7560b366e192\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vhlnb" podUID="9e54fc8c-4579-4b2f-a627-7560b366e192" Dec 13 14:09:46.393314 kubelet[2023]: I1213 14:09:46.393268 2023 topology_manager.go:215] "Topology Admit Handler" podUID="d0090469-4fc9-4b3f-a2af-50f1359a23f9" podNamespace="default" podName="nginx-deployment-85f456d6dd-5jhng" Dec 13 14:09:46.398332 systemd[1]: Created slice kubepods-besteffort-podd0090469_4fc9_4b3f_a2af_50f1359a23f9.slice. Dec 13 14:09:46.471854 kubelet[2023]: I1213 14:09:46.471819 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pc7tm\" (UniqueName: \"kubernetes.io/projected/d0090469-4fc9-4b3f-a2af-50f1359a23f9-kube-api-access-pc7tm\") pod \"nginx-deployment-85f456d6dd-5jhng\" (UID: \"d0090469-4fc9-4b3f-a2af-50f1359a23f9\") " pod="default/nginx-deployment-85f456d6dd-5jhng" Dec 13 14:09:46.702154 env[1478]: time="2024-12-13T14:09:46.702034963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-5jhng,Uid:d0090469-4fc9-4b3f-a2af-50f1359a23f9,Namespace:default,Attempt:0,}" Dec 13 14:09:46.834788 env[1478]: time="2024-12-13T14:09:46.834584457Z" level=error msg="Failed to destroy network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:46.839027 env[1478]: time="2024-12-13T14:09:46.836484047Z" level=error msg="encountered an error cleaning up failed sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:46.839027 env[1478]: time="2024-12-13T14:09:46.836556730Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-5jhng,Uid:d0090469-4fc9-4b3f-a2af-50f1359a23f9,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:46.838272 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881-shm.mount: Deactivated successfully. Dec 13 14:09:46.839263 kubelet[2023]: E1213 14:09:46.836801 2023 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:46.839263 kubelet[2023]: E1213 14:09:46.836867 2023 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-5jhng" Dec 13 14:09:46.839263 kubelet[2023]: E1213 14:09:46.836891 2023 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-5jhng" Dec 13 14:09:46.839351 kubelet[2023]: E1213 14:09:46.836941 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-5jhng_default(d0090469-4fc9-4b3f-a2af-50f1359a23f9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-5jhng_default(d0090469-4fc9-4b3f-a2af-50f1359a23f9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-5jhng" podUID="d0090469-4fc9-4b3f-a2af-50f1359a23f9" Dec 13 14:09:47.035483 kubelet[2023]: E1213 14:09:47.035439 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:47.359002 kubelet[2023]: I1213 14:09:47.358390 2023 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:09:47.359257 env[1478]: time="2024-12-13T14:09:47.359156841Z" level=info msg="StopPodSandbox for \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\"" Dec 13 14:09:47.382752 env[1478]: time="2024-12-13T14:09:47.382692162Z" level=error msg="StopPodSandbox for \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\" failed" error="failed to destroy network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:09:47.382954 kubelet[2023]: E1213 14:09:47.382915 2023 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:09:47.383020 kubelet[2023]: E1213 14:09:47.382962 2023 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881"} Dec 13 14:09:47.383020 kubelet[2023]: E1213 14:09:47.382999 2023 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d0090469-4fc9-4b3f-a2af-50f1359a23f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:09:47.383153 kubelet[2023]: E1213 14:09:47.383022 2023 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d0090469-4fc9-4b3f-a2af-50f1359a23f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-5jhng" podUID="d0090469-4fc9-4b3f-a2af-50f1359a23f9" Dec 13 14:09:48.036142 kubelet[2023]: E1213 14:09:48.036100 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:49.036943 kubelet[2023]: E1213 14:09:49.036903 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:50.037255 kubelet[2023]: E1213 14:09:50.037178 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:50.514294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount661294020.mount: Deactivated successfully. Dec 13 14:09:50.568480 env[1478]: time="2024-12-13T14:09:50.568439096Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:50.575396 env[1478]: time="2024-12-13T14:09:50.575352687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:50.579633 env[1478]: time="2024-12-13T14:09:50.579605549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:50.583801 env[1478]: time="2024-12-13T14:09:50.583761409Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:50.584375 env[1478]: time="2024-12-13T14:09:50.584348868Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:09:50.597979 env[1478]: time="2024-12-13T14:09:50.597949724Z" level=info msg="CreateContainer within sandbox \"19e1229fd87778a3887d8f56b58cc8290581bd57b215033ae55b6693ab091920\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:09:50.625782 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount697738547.mount: Deactivated successfully. Dec 13 14:09:50.641484 env[1478]: time="2024-12-13T14:09:50.641418819Z" level=info msg="CreateContainer within sandbox \"19e1229fd87778a3887d8f56b58cc8290581bd57b215033ae55b6693ab091920\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"aa38c26a8c37b1a88bdca3a532c8059c0dce59e917b5769af31487327c38f842\"" Dec 13 14:09:50.642137 env[1478]: time="2024-12-13T14:09:50.642107442Z" level=info msg="StartContainer for \"aa38c26a8c37b1a88bdca3a532c8059c0dce59e917b5769af31487327c38f842\"" Dec 13 14:09:50.656924 systemd[1]: Started cri-containerd-aa38c26a8c37b1a88bdca3a532c8059c0dce59e917b5769af31487327c38f842.scope. Dec 13 14:09:50.693513 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:09:50.693618 kernel: audit: type=1400 audit(1734098990.671:545): avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2098 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:50.719254 kernel: audit: type=1300 audit(1734098990.671:545): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2098 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:50.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161333863323661386333376231613838626463613361353332633830 Dec 13 14:09:50.743414 kernel: audit: type=1327 audit(1734098990.671:545): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161333863323661386333376231613838626463613361353332633830 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.760518 kernel: audit: type=1400 audit(1734098990.671:546): avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.777558 kernel: audit: type=1400 audit(1734098990.671:546): avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.795080 kernel: audit: type=1400 audit(1734098990.671:546): avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.812184 kernel: audit: type=1400 audit(1734098990.671:546): avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.812498 env[1478]: time="2024-12-13T14:09:50.812450425Z" level=info msg="StartContainer for \"aa38c26a8c37b1a88bdca3a532c8059c0dce59e917b5769af31487327c38f842\" returns successfully" Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.829556 kernel: audit: type=1400 audit(1734098990.671:546): avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.847533 kernel: audit: type=1400 audit(1734098990.671:546): avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.847639 kernel: audit: type=1400 audit(1734098990.671:546): avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.671000 audit: BPF prog-id=79 op=LOAD Dec 13 14:09:50.671000 audit[2587]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2098 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:50.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161333863323661386333376231613838626463613361353332633830 Dec 13 14:09:50.676000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.676000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.676000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.676000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.676000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.676000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.676000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.676000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.676000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.676000 audit: BPF prog-id=80 op=LOAD Dec 13 14:09:50.676000 audit[2587]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2098 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:50.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161333863323661386333376231613838626463613361353332633830 Dec 13 14:09:50.692000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:09:50.692000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:50.692000 audit: BPF prog-id=81 op=LOAD Dec 13 14:09:50.692000 audit[2587]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2098 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:50.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161333863323661386333376231613838626463613361353332633830 Dec 13 14:09:51.037408 kubelet[2023]: E1213 14:09:51.037272 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:51.052782 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:09:51.052893 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:09:51.381789 kubelet[2023]: I1213 14:09:51.381449 2023 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-bd6gg" podStartSLOduration=4.219928828 podStartE2EDuration="19.381431582s" podCreationTimestamp="2024-12-13 14:09:32 +0000 UTC" firstStartedPulling="2024-12-13 14:09:35.424033834 +0000 UTC m=+4.327906798" lastFinishedPulling="2024-12-13 14:09:50.585536588 +0000 UTC m=+19.489409552" observedRunningTime="2024-12-13 14:09:51.381308138 +0000 UTC m=+20.285181102" watchObservedRunningTime="2024-12-13 14:09:51.381431582 +0000 UTC m=+20.285304546" Dec 13 14:09:52.023550 kubelet[2023]: E1213 14:09:52.023516 2023 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:52.037766 kubelet[2023]: E1213 14:09:52.037733 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:52.315000 audit[2732]: AVC avc: denied { write } for pid=2732 comm="tee" name="fd" dev="proc" ino=18917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:09:52.315000 audit[2732]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff3f89a18 a2=241 a3=1b6 items=1 ppid=2679 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.315000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:09:52.315000 audit: PATH item=0 name="/dev/fd/63" inode=18910 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:52.315000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:09:52.316000 audit[2734]: AVC avc: denied { write } for pid=2734 comm="tee" name="fd" dev="proc" ino=18921 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:09:52.316000 audit[2734]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff2b66a08 a2=241 a3=1b6 items=1 ppid=2675 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.316000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:09:52.316000 audit: PATH item=0 name="/dev/fd/63" inode=18913 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:52.316000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:09:52.316000 audit[2736]: AVC avc: denied { write } for pid=2736 comm="tee" name="fd" dev="proc" ino=18925 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:09:52.316000 audit[2736]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd3931a18 a2=241 a3=1b6 items=1 ppid=2674 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.316000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:09:52.316000 audit: PATH item=0 name="/dev/fd/63" inode=18914 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:52.316000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:09:52.318000 audit[2728]: AVC avc: denied { write } for pid=2728 comm="tee" name="fd" dev="proc" ino=17967 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:09:52.320000 audit[2738]: AVC avc: denied { write } for pid=2738 comm="tee" name="fd" dev="proc" ino=17970 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:09:52.323000 audit[2740]: AVC avc: denied { write } for pid=2740 comm="tee" name="fd" dev="proc" ino=18930 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:09:52.323000 audit[2740]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffeb94a09 a2=241 a3=1b6 items=1 ppid=2685 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.323000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:09:52.323000 audit: PATH item=0 name="/dev/fd/63" inode=17964 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:52.323000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:09:52.318000 audit[2728]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc34dba19 a2=241 a3=1b6 items=1 ppid=2683 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.318000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:09:52.318000 audit: PATH item=0 name="/dev/fd/63" inode=17958 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:52.318000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:09:52.320000 audit[2738]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc7376a1a a2=241 a3=1b6 items=1 ppid=2681 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.320000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:09:52.320000 audit: PATH item=0 name="/dev/fd/63" inode=17963 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:52.320000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:09:52.325000 audit[2745]: AVC avc: denied { write } for pid=2745 comm="tee" name="fd" dev="proc" ino=18934 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:09:52.325000 audit[2745]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff801ba18 a2=241 a3=1b6 items=1 ppid=2689 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.325000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:09:52.325000 audit: PATH item=0 name="/dev/fd/63" inode=18927 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:52.325000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:09:52.386556 systemd[1]: run-containerd-runc-k8s.io-aa38c26a8c37b1a88bdca3a532c8059c0dce59e917b5769af31487327c38f842-runc.1hF1AT.mount: Deactivated successfully. Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit: BPF prog-id=82 op=LOAD Dec 13 14:09:52.520000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe6b21db8 a2=98 a3=ffffe6b21da8 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.520000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit: BPF prog-id=83 op=LOAD Dec 13 14:09:52.520000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe6b21a48 a2=74 a3=95 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.520000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.520000 audit: BPF prog-id=84 op=LOAD Dec 13 14:09:52.520000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe6b21aa8 a2=94 a3=2 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.520000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit: BPF prog-id=85 op=LOAD Dec 13 14:09:52.612000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe6b21a68 a2=40 a3=ffffe6b21a98 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.612000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.612000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:09:52.612000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.612000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe6b21b80 a2=50 a3=0 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.612000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6b21ad8 a2=28 a3=ffffe6b21c08 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6b21b08 a2=28 a3=ffffe6b21c38 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6b219b8 a2=28 a3=ffffe6b21ae8 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6b21b28 a2=28 a3=ffffe6b21c58 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6b21b08 a2=28 a3=ffffe6b21c38 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6b21af8 a2=28 a3=ffffe6b21c28 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6b21b28 a2=28 a3=ffffe6b21c58 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6b21b08 a2=28 a3=ffffe6b21c38 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6b21b28 a2=28 a3=ffffe6b21c58 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6b21af8 a2=28 a3=ffffe6b21c28 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.620000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.620000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6b21b78 a2=28 a3=ffffe6b21cb8 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe6b218b0 a2=50 a3=0 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit: BPF prog-id=86 op=LOAD Dec 13 14:09:52.621000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe6b218b8 a2=94 a3=5 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.621000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe6b219c0 a2=50 a3=0 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe6b21b08 a2=4 a3=3 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:09:52.621000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe6b21ae8 a2=94 a3=6 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:09:52.621000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe6b212b8 a2=94 a3=83 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.621000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:09:52.621000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe6b212b8 a2=94 a3=83 items=0 ppid=2676 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit: BPF prog-id=87 op=LOAD Dec 13 14:09:52.630000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef081b88 a2=98 a3=ffffef081b78 items=0 ppid=2676 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.630000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:09:52.630000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit: BPF prog-id=88 op=LOAD Dec 13 14:09:52.630000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef081a38 a2=74 a3=95 items=0 ppid=2676 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.630000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:09:52.630000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.630000 audit: BPF prog-id=89 op=LOAD Dec 13 14:09:52.630000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef081a68 a2=40 a3=ffffef081a98 items=0 ppid=2676 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.630000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:09:52.630000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:09:52.724504 systemd-networkd[1625]: vxlan.calico: Link UP Dec 13 14:09:52.724513 systemd-networkd[1625]: vxlan.calico: Gained carrier Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit: BPF prog-id=90 op=LOAD Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcce8cd98 a2=98 a3=ffffcce8cd88 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit: BPF prog-id=91 op=LOAD Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcce8ca78 a2=74 a3=95 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit: BPF prog-id=92 op=LOAD Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcce8cad8 a2=94 a3=2 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcce8cb08 a2=28 a3=ffffcce8cc38 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcce8cb38 a2=28 a3=ffffcce8cc68 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcce8c9e8 a2=28 a3=ffffcce8cb18 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcce8cb58 a2=28 a3=ffffcce8cc88 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcce8cb38 a2=28 a3=ffffcce8cc68 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcce8cb28 a2=28 a3=ffffcce8cc58 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcce8cb58 a2=28 a3=ffffcce8cc88 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.746000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.746000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcce8cb38 a2=28 a3=ffffcce8cc68 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcce8cb58 a2=28 a3=ffffcce8cc88 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcce8cb28 a2=28 a3=ffffcce8cc58 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcce8cba8 a2=28 a3=ffffcce8cce8 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit: BPF prog-id=93 op=LOAD Dec 13 14:09:52.747000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcce8c9c8 a2=40 a3=ffffcce8c9f8 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.747000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcce8c9f0 a2=50 a3=0 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffcce8c9f0 a2=50 a3=0 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit: BPF prog-id=94 op=LOAD Dec 13 14:09:52.747000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcce8c158 a2=94 a3=2 items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.747000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.747000 audit: BPF prog-id=95 op=LOAD Dec 13 14:09:52.747000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcce8c2e8 a2=94 a3=2d items=0 ppid=2676 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:09:52.751000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.751000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.751000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.751000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.751000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.751000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.751000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.751000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.751000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.751000 audit: BPF prog-id=96 op=LOAD Dec 13 14:09:52.751000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7bdab28 a2=98 a3=ffffc7bdab18 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.751000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.753000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit: BPF prog-id=97 op=LOAD Dec 13 14:09:52.754000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7bda7b8 a2=74 a3=95 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.754000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.754000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.754000 audit: BPF prog-id=98 op=LOAD Dec 13 14:09:52.754000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7bda818 a2=94 a3=2 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.754000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.755000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit: BPF prog-id=99 op=LOAD Dec 13 14:09:52.858000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7bda7d8 a2=40 a3=ffffc7bda808 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.858000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:09:52.858000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.858000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc7bda8f0 a2=50 a3=0 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.867000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.867000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7bda848 a2=28 a3=ffffc7bda978 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.867000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.867000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7bda878 a2=28 a3=ffffc7bda9a8 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.867000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.867000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7bda728 a2=28 a3=ffffc7bda858 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.867000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.867000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7bda898 a2=28 a3=ffffc7bda9c8 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.867000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.867000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7bda878 a2=28 a3=ffffc7bda9a8 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7bda868 a2=28 a3=ffffc7bda998 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7bda898 a2=28 a3=ffffc7bda9c8 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7bda878 a2=28 a3=ffffc7bda9a8 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7bda898 a2=28 a3=ffffc7bda9c8 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7bda868 a2=28 a3=ffffc7bda998 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7bda8e8 a2=28 a3=ffffc7bdaa28 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc7bda620 a2=50 a3=0 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit: BPF prog-id=100 op=LOAD Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7bda628 a2=94 a3=5 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc7bda730 a2=50 a3=0 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc7bda878 a2=4 a3=3 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { confidentiality } for pid=2837 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc7bda858 a2=94 a3=6 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc7bda028 a2=94 a3=83 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.868000 audit[2837]: AVC avc: denied { confidentiality } for pid=2837 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:09:52.868000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc7bda028 a2=94 a3=83 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.870000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.870000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc7bdba68 a2=10 a3=ffffc7bdbb58 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.870000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.870000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc7bdb928 a2=10 a3=ffffc7bdba18 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.870000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.870000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc7bdb898 a2=10 a3=ffffc7bdba18 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.870000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:52.870000 audit[2837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc7bdb898 a2=10 a3=ffffc7bdba18 items=0 ppid=2676 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:09:52.876000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:09:52.876000 audit[1426]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=24 a0=ffffffffffffff9c a1=aaaad2077d08 a2=88100 a3=0 items=1 ppid=1 pid=1426 auid=4294967295 uid=245 gid=245 euid=245 suid=245 fsuid=245 egid=245 sgid=245 fsgid=245 tty=(none) ses=4294967295 comm="systemd-resolve" exe="/usr/lib/systemd/systemd-resolved" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.876000 audit: CWD cwd="/" Dec 13 14:09:52.876000 audit: PATH item=0 name="/run/systemd/resolve/stub-resolv.conf" inode=1858 dev=00:18 mode=0100644 ouid=245 ogid=245 rdev=00:00 obj=system_u:object_r:systemd_resolved_runtime_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:09:52.876000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-resolved" Dec 13 14:09:52.991000 audit[2862]: NETFILTER_CFG table=mangle:71 family=2 entries=16 op=nft_register_chain pid=2862 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:09:52.991000 audit[2862]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffff009e70 a2=0 a3=ffffbf0bbfa8 items=0 ppid=2676 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.991000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:09:53.001000 audit[2865]: NETFILTER_CFG table=nat:72 family=2 entries=15 op=nft_register_chain pid=2865 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:09:53.001000 audit[2865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffee9f9ef0 a2=0 a3=ffffaaaa2fa8 items=0 ppid=2676 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:53.001000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:09:53.024000 audit[2863]: NETFILTER_CFG table=filter:73 family=2 entries=39 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:09:53.024000 audit[2863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffdb2d1230 a2=0 a3=ffff8a9c5fa8 items=0 ppid=2676 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:53.024000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:09:53.038507 kubelet[2023]: E1213 14:09:53.038457 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:53.052000 audit[2861]: NETFILTER_CFG table=raw:74 family=2 entries=21 op=nft_register_chain pid=2861 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:09:53.052000 audit[2861]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffeed29e70 a2=0 a3=ffff85f02fa8 items=0 ppid=2676 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:53.052000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:09:53.922781 systemd-networkd[1625]: vxlan.calico: Gained IPv6LL Dec 13 14:09:54.039395 kubelet[2023]: E1213 14:09:54.039332 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:55.040358 kubelet[2023]: E1213 14:09:55.040321 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:56.041214 kubelet[2023]: E1213 14:09:56.041180 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:57.042118 kubelet[2023]: E1213 14:09:57.042078 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:58.043072 kubelet[2023]: E1213 14:09:58.043034 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:59.043569 kubelet[2023]: E1213 14:09:59.043525 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:09:59.329274 env[1478]: time="2024-12-13T14:09:59.328991064Z" level=info msg="StopPodSandbox for \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\"" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.372 [INFO][2897] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.372 [INFO][2897] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" iface="eth0" netns="/var/run/netns/cni-279586b6-dc08-ce98-47db-26ed89d6bb8c" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.372 [INFO][2897] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" iface="eth0" netns="/var/run/netns/cni-279586b6-dc08-ce98-47db-26ed89d6bb8c" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.373 [INFO][2897] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" iface="eth0" netns="/var/run/netns/cni-279586b6-dc08-ce98-47db-26ed89d6bb8c" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.373 [INFO][2897] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.373 [INFO][2897] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.391 [INFO][2904] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" HandleID="k8s-pod-network.4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.391 [INFO][2904] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.391 [INFO][2904] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.403 [WARNING][2904] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" HandleID="k8s-pod-network.4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.403 [INFO][2904] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" HandleID="k8s-pod-network.4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.405 [INFO][2904] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:59.409693 env[1478]: 2024-12-13 14:09:59.406 [INFO][2897] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:09:59.409239 systemd[1]: run-netns-cni\x2d279586b6\x2ddc08\x2dce98\x2d47db\x2d26ed89d6bb8c.mount: Deactivated successfully. Dec 13 14:09:59.410287 env[1478]: time="2024-12-13T14:09:59.409906713Z" level=info msg="TearDown network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\" successfully" Dec 13 14:09:59.410287 env[1478]: time="2024-12-13T14:09:59.409940674Z" level=info msg="StopPodSandbox for \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\" returns successfully" Dec 13 14:09:59.410837 env[1478]: time="2024-12-13T14:09:59.410808219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vhlnb,Uid:9e54fc8c-4579-4b2f-a627-7560b366e192,Namespace:calico-system,Attempt:1,}" Dec 13 14:09:59.546121 systemd-networkd[1625]: caliea9591b3d98: Link UP Dec 13 14:09:59.559507 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:09:59.559874 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea9591b3d98: link becomes ready Dec 13 14:09:59.559770 systemd-networkd[1625]: caliea9591b3d98: Gained carrier Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.475 [INFO][2910] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.19-k8s-csi--node--driver--vhlnb-eth0 csi-node-driver- calico-system 9e54fc8c-4579-4b2f-a627-7560b366e192 1249 0 2024-12-13 14:09:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.19 csi-node-driver-vhlnb eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliea9591b3d98 [] []}} ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Namespace="calico-system" Pod="csi-node-driver-vhlnb" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--vhlnb-" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.476 [INFO][2910] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Namespace="calico-system" Pod="csi-node-driver-vhlnb" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.498 [INFO][2922] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" HandleID="k8s-pod-network.e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.514 [INFO][2922] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" HandleID="k8s-pod-network.e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000316a50), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.19", "pod":"csi-node-driver-vhlnb", "timestamp":"2024-12-13 14:09:59.4983817 +0000 UTC"}, Hostname:"10.200.20.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.514 [INFO][2922] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.514 [INFO][2922] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.514 [INFO][2922] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.19' Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.515 [INFO][2922] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" host="10.200.20.19" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.519 [INFO][2922] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.19" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.522 [INFO][2922] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="10.200.20.19" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.524 [INFO][2922] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="10.200.20.19" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.526 [INFO][2922] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="10.200.20.19" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.526 [INFO][2922] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" host="10.200.20.19" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.528 [INFO][2922] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4 Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.532 [INFO][2922] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" host="10.200.20.19" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.542 [INFO][2922] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.65/26] block=192.168.5.64/26 handle="k8s-pod-network.e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" host="10.200.20.19" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.542 [INFO][2922] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.65/26] handle="k8s-pod-network.e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" host="10.200.20.19" Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.542 [INFO][2922] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:59.575226 env[1478]: 2024-12-13 14:09:59.542 [INFO][2922] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.65/26] IPv6=[] ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" HandleID="k8s-pod-network.e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.576162 env[1478]: 2024-12-13 14:09:59.543 [INFO][2910] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Namespace="calico-system" Pod="csi-node-driver-vhlnb" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-csi--node--driver--vhlnb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9e54fc8c-4579-4b2f-a627-7560b366e192", ResourceVersion:"1249", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 9, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"", Pod:"csi-node-driver-vhlnb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliea9591b3d98", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:59.576162 env[1478]: 2024-12-13 14:09:59.544 [INFO][2910] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.65/32] ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Namespace="calico-system" Pod="csi-node-driver-vhlnb" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.576162 env[1478]: 2024-12-13 14:09:59.544 [INFO][2910] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliea9591b3d98 ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Namespace="calico-system" Pod="csi-node-driver-vhlnb" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.576162 env[1478]: 2024-12-13 14:09:59.560 [INFO][2910] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Namespace="calico-system" Pod="csi-node-driver-vhlnb" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.576162 env[1478]: 2024-12-13 14:09:59.562 [INFO][2910] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Namespace="calico-system" Pod="csi-node-driver-vhlnb" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-csi--node--driver--vhlnb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9e54fc8c-4579-4b2f-a627-7560b366e192", ResourceVersion:"1249", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 9, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4", Pod:"csi-node-driver-vhlnb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliea9591b3d98", MAC:"ea:af:25:8e:18:c7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:59.576162 env[1478]: 2024-12-13 14:09:59.571 [INFO][2910] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4" Namespace="calico-system" Pod="csi-node-driver-vhlnb" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:09:59.592744 kernel: kauditd_printk_skb: 572 callbacks suppressed Dec 13 14:09:59.592919 kernel: audit: type=1325 audit(1734098999.580:653): table=filter:75 family=2 entries=34 op=nft_register_chain pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:09:59.580000 audit[2940]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_chain pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:09:59.580000 audit[2940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffe5d42aa0 a2=0 a3=ffff8b05cfa8 items=0 ppid=2676 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:59.631107 kernel: audit: type=1300 audit(1734098999.580:653): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffe5d42aa0 a2=0 a3=ffff8b05cfa8 items=0 ppid=2676 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:59.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:09:59.648339 kernel: audit: type=1327 audit(1734098999.580:653): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:09:59.656475 env[1478]: time="2024-12-13T14:09:59.656406008Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:09:59.656689 env[1478]: time="2024-12-13T14:09:59.656636855Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:09:59.656797 env[1478]: time="2024-12-13T14:09:59.656775499Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:09:59.657113 env[1478]: time="2024-12-13T14:09:59.657063027Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4 pid=2953 runtime=io.containerd.runc.v2 Dec 13 14:09:59.673869 systemd[1]: Started cri-containerd-e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4.scope. Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.719631 kernel: audit: type=1400 audit(1734098999.681:654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.719736 kernel: audit: type=1400 audit(1734098999.681:655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.737727 kernel: audit: type=1400 audit(1734098999.681:656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.756151 kernel: audit: type=1400 audit(1734098999.681:657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.777898 kernel: audit: type=1400 audit(1734098999.681:658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.778417 kernel: audit: type=1400 audit(1734098999.681:659): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.816425 kernel: audit: type=1400 audit(1734098999.681:660): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.681000 audit: BPF prog-id=101 op=LOAD Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2953 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:59.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633433316666396137346666333062373962323038653863613530 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2953 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:59.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633433316666396137346666333062373962323038653863613530 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.687000 audit: BPF prog-id=102 op=LOAD Dec 13 14:09:59.687000 audit[2963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2953 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:59.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633433316666396137346666333062373962323038653863613530 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit: BPF prog-id=103 op=LOAD Dec 13 14:09:59.700000 audit[2963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2953 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:59.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633433316666396137346666333062373962323038653863613530 Dec 13 14:09:59.700000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:09:59.700000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:59.700000 audit: BPF prog-id=104 op=LOAD Dec 13 14:09:59.700000 audit[2963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2953 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:59.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633433316666396137346666333062373962323038653863613530 Dec 13 14:09:59.833312 env[1478]: time="2024-12-13T14:09:59.833265938Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vhlnb,Uid:9e54fc8c-4579-4b2f-a627-7560b366e192,Namespace:calico-system,Attempt:1,} returns sandbox id \"e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4\"" Dec 13 14:09:59.836008 env[1478]: time="2024-12-13T14:09:59.835903174Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:10:00.044625 kubelet[2023]: E1213 14:10:00.044569 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:00.409424 systemd[1]: run-containerd-runc-k8s.io-e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4-runc.qEsvaQ.mount: Deactivated successfully. Dec 13 14:10:00.642822 systemd-networkd[1625]: caliea9591b3d98: Gained IPv6LL Dec 13 14:10:01.045490 kubelet[2023]: E1213 14:10:01.045440 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:01.309546 env[1478]: time="2024-12-13T14:10:01.309221585Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:01.316897 env[1478]: time="2024-12-13T14:10:01.316851319Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:01.325134 env[1478]: time="2024-12-13T14:10:01.325105270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:01.329235 env[1478]: time="2024-12-13T14:10:01.329070422Z" level=info msg="StopPodSandbox for \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\"" Dec 13 14:10:01.330168 env[1478]: time="2024-12-13T14:10:01.330141412Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:01.330523 env[1478]: time="2024-12-13T14:10:01.330477461Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:10:01.332757 env[1478]: time="2024-12-13T14:10:01.332731124Z" level=info msg="CreateContainer within sandbox \"e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:10:01.362232 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1969038423.mount: Deactivated successfully. Dec 13 14:10:01.378414 env[1478]: time="2024-12-13T14:10:01.378355045Z" level=info msg="CreateContainer within sandbox \"e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e1924bb426d416ac8af97bd55b7cf3d369121f14b1f9a64c3ae8510ea9da3e21\"" Dec 13 14:10:01.379422 env[1478]: time="2024-12-13T14:10:01.379385554Z" level=info msg="StartContainer for \"e1924bb426d416ac8af97bd55b7cf3d369121f14b1f9a64c3ae8510ea9da3e21\"" Dec 13 14:10:01.404219 systemd[1]: Started cri-containerd-e1924bb426d416ac8af97bd55b7cf3d369121f14b1f9a64c3ae8510ea9da3e21.scope. Dec 13 14:10:01.409389 systemd[1]: run-containerd-runc-k8s.io-e1924bb426d416ac8af97bd55b7cf3d369121f14b1f9a64c3ae8510ea9da3e21-runc.kwKBmR.mount: Deactivated successfully. Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2953 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531393234626234323664343136616338616639376264353562376366 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.424000 audit: BPF prog-id=105 op=LOAD Dec 13 14:10:01.424000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2953 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531393234626234323664343136616338616639376264353562376366 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit: BPF prog-id=106 op=LOAD Dec 13 14:10:01.425000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2953 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531393234626234323664343136616338616639376264353562376366 Dec 13 14:10:01.425000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:10:01.425000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.425000 audit: BPF prog-id=107 op=LOAD Dec 13 14:10:01.425000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2953 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531393234626234323664343136616338616639376264353562376366 Dec 13 14:10:01.445757 env[1478]: time="2024-12-13T14:10:01.445705414Z" level=info msg="StartContainer for \"e1924bb426d416ac8af97bd55b7cf3d369121f14b1f9a64c3ae8510ea9da3e21\" returns successfully" Dec 13 14:10:01.447110 env[1478]: time="2024-12-13T14:10:01.447072413Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.400 [INFO][3002] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.400 [INFO][3002] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" iface="eth0" netns="/var/run/netns/cni-43955b49-b830-b0d2-6877-eb2c27f87e1c" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.400 [INFO][3002] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" iface="eth0" netns="/var/run/netns/cni-43955b49-b830-b0d2-6877-eb2c27f87e1c" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.401 [INFO][3002] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" iface="eth0" netns="/var/run/netns/cni-43955b49-b830-b0d2-6877-eb2c27f87e1c" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.401 [INFO][3002] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.401 [INFO][3002] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.436 [INFO][3028] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" HandleID="k8s-pod-network.73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.437 [INFO][3028] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.437 [INFO][3028] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.451 [WARNING][3028] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" HandleID="k8s-pod-network.73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.451 [INFO][3028] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" HandleID="k8s-pod-network.73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.454 [INFO][3028] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:10:01.456995 env[1478]: 2024-12-13 14:10:01.455 [INFO][3002] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:01.459402 systemd[1]: run-netns-cni\x2d43955b49\x2db830\x2db0d2\x2d6877\x2deb2c27f87e1c.mount: Deactivated successfully. Dec 13 14:10:01.460270 env[1478]: time="2024-12-13T14:10:01.460228022Z" level=info msg="TearDown network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\" successfully" Dec 13 14:10:01.460358 env[1478]: time="2024-12-13T14:10:01.460341905Z" level=info msg="StopPodSandbox for \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\" returns successfully" Dec 13 14:10:01.461056 env[1478]: time="2024-12-13T14:10:01.461029644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-5jhng,Uid:d0090469-4fc9-4b3f-a2af-50f1359a23f9,Namespace:default,Attempt:1,}" Dec 13 14:10:01.614798 systemd-networkd[1625]: caliac67147a880: Link UP Dec 13 14:10:01.632039 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:10:01.632141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliac67147a880: link becomes ready Dec 13 14:10:01.632951 systemd-networkd[1625]: caliac67147a880: Gained carrier Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.546 [INFO][3050] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0 nginx-deployment-85f456d6dd- default d0090469-4fc9-4b3f-a2af-50f1359a23f9 1261 0 2024-12-13 14:09:46 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.19 nginx-deployment-85f456d6dd-5jhng eth0 default [] [] [kns.default ksa.default.default] caliac67147a880 [] []}} ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Namespace="default" Pod="nginx-deployment-85f456d6dd-5jhng" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.546 [INFO][3050] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Namespace="default" Pod="nginx-deployment-85f456d6dd-5jhng" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.568 [INFO][3063] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" HandleID="k8s-pod-network.10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.579 [INFO][3063] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" HandleID="k8s-pod-network.10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000318b90), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.19", "pod":"nginx-deployment-85f456d6dd-5jhng", "timestamp":"2024-12-13 14:10:01.568466899 +0000 UTC"}, Hostname:"10.200.20.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.580 [INFO][3063] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.580 [INFO][3063] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.580 [INFO][3063] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.19' Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.581 [INFO][3063] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" host="10.200.20.19" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.584 [INFO][3063] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.19" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.587 [INFO][3063] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="10.200.20.19" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.588 [INFO][3063] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="10.200.20.19" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.590 [INFO][3063] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="10.200.20.19" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.590 [INFO][3063] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" host="10.200.20.19" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.591 [INFO][3063] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66 Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.598 [INFO][3063] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" host="10.200.20.19" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.609 [INFO][3063] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.66/26] block=192.168.5.64/26 handle="k8s-pod-network.10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" host="10.200.20.19" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.609 [INFO][3063] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.66/26] handle="k8s-pod-network.10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" host="10.200.20.19" Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.609 [INFO][3063] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:10:01.645376 env[1478]: 2024-12-13 14:10:01.609 [INFO][3063] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.66/26] IPv6=[] ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" HandleID="k8s-pod-network.10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.645992 env[1478]: 2024-12-13 14:10:01.611 [INFO][3050] cni-plugin/k8s.go 386: Populated endpoint ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Namespace="default" Pod="nginx-deployment-85f456d6dd-5jhng" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"d0090469-4fc9-4b3f-a2af-50f1359a23f9", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 9, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-5jhng", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliac67147a880", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:01.645992 env[1478]: 2024-12-13 14:10:01.611 [INFO][3050] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.66/32] ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Namespace="default" Pod="nginx-deployment-85f456d6dd-5jhng" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.645992 env[1478]: 2024-12-13 14:10:01.611 [INFO][3050] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliac67147a880 ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Namespace="default" Pod="nginx-deployment-85f456d6dd-5jhng" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.645992 env[1478]: 2024-12-13 14:10:01.633 [INFO][3050] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Namespace="default" Pod="nginx-deployment-85f456d6dd-5jhng" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.645992 env[1478]: 2024-12-13 14:10:01.633 [INFO][3050] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Namespace="default" Pod="nginx-deployment-85f456d6dd-5jhng" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"d0090469-4fc9-4b3f-a2af-50f1359a23f9", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 9, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66", Pod:"nginx-deployment-85f456d6dd-5jhng", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliac67147a880", MAC:"4a:96:6e:da:93:60", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:01.645992 env[1478]: 2024-12-13 14:10:01.644 [INFO][3050] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66" Namespace="default" Pod="nginx-deployment-85f456d6dd-5jhng" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:01.654000 audit[3083]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:10:01.654000 audit[3083]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffe33db000 a2=0 a3=ffff91187fa8 items=0 ppid=2676 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.654000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:10:01.662689 env[1478]: time="2024-12-13T14:10:01.662616461Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:10:01.662831 env[1478]: time="2024-12-13T14:10:01.662670822Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:10:01.662831 env[1478]: time="2024-12-13T14:10:01.662682263Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:10:01.662929 env[1478]: time="2024-12-13T14:10:01.662834027Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66 pid=3091 runtime=io.containerd.runc.v2 Dec 13 14:10:01.677466 systemd[1]: Started cri-containerd-10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66.scope. Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.689000 audit: BPF prog-id=108 op=LOAD Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666663386261386439333331373531613235616166386336323966 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666663386261386439333331373531613235616166386336323966 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.690000 audit: BPF prog-id=109 op=LOAD Dec 13 14:10:01.690000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666663386261386439333331373531613235616166386336323966 Dec 13 14:10:01.691000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.691000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.691000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.691000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.691000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.691000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.691000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.691000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.691000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.691000 audit: BPF prog-id=110 op=LOAD Dec 13 14:10:01.691000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666663386261386439333331373531613235616166386336323966 Dec 13 14:10:01.691000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:10:01.692000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:01.692000 audit: BPF prog-id=111 op=LOAD Dec 13 14:10:01.692000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:01.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666663386261386439333331373531613235616166386336323966 Dec 13 14:10:01.714446 env[1478]: time="2024-12-13T14:10:01.714399474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-5jhng,Uid:d0090469-4fc9-4b3f-a2af-50f1359a23f9,Namespace:default,Attempt:1,} returns sandbox id \"10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66\"" Dec 13 14:10:02.045992 kubelet[2023]: E1213 14:10:02.045960 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:03.046934 kubelet[2023]: E1213 14:10:03.046898 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:03.522853 systemd-networkd[1625]: caliac67147a880: Gained IPv6LL Dec 13 14:10:03.763946 env[1478]: time="2024-12-13T14:10:03.763896290Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:03.772752 env[1478]: time="2024-12-13T14:10:03.772713772Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:03.777524 env[1478]: time="2024-12-13T14:10:03.777425181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:03.783973 env[1478]: time="2024-12-13T14:10:03.783927199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:03.784588 env[1478]: time="2024-12-13T14:10:03.784555857Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:10:03.787238 env[1478]: time="2024-12-13T14:10:03.787172248Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:10:03.787491 env[1478]: time="2024-12-13T14:10:03.787303732Z" level=info msg="CreateContainer within sandbox \"e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:10:03.824866 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2598910440.mount: Deactivated successfully. Dec 13 14:10:03.846005 env[1478]: time="2024-12-13T14:10:03.845954700Z" level=info msg="CreateContainer within sandbox \"e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b3fd9beed3bd197abee449d9b44ae474c4df40c216499433ed87e881e17ebc5b\"" Dec 13 14:10:03.846879 env[1478]: time="2024-12-13T14:10:03.846853165Z" level=info msg="StartContainer for \"b3fd9beed3bd197abee449d9b44ae474c4df40c216499433ed87e881e17ebc5b\"" Dec 13 14:10:03.865666 systemd[1]: Started cri-containerd-b3fd9beed3bd197abee449d9b44ae474c4df40c216499433ed87e881e17ebc5b.scope. Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2953 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:03.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233666439626565643362643139376162656534343964396234346165 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit: BPF prog-id=112 op=LOAD Dec 13 14:10:03.882000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2953 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:03.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233666439626565643362643139376162656534343964396234346165 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit: BPF prog-id=113 op=LOAD Dec 13 14:10:03.882000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2953 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:03.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233666439626565643362643139376162656534343964396234346165 Dec 13 14:10:03.882000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:10:03.882000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:03.882000 audit: BPF prog-id=114 op=LOAD Dec 13 14:10:03.882000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2953 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:03.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233666439626565643362643139376162656534343964396234346165 Dec 13 14:10:03.902762 env[1478]: time="2024-12-13T14:10:03.902718657Z" level=info msg="StartContainer for \"b3fd9beed3bd197abee449d9b44ae474c4df40c216499433ed87e881e17ebc5b\" returns successfully" Dec 13 14:10:04.047124 kubelet[2023]: E1213 14:10:04.046994 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:04.121286 kubelet[2023]: I1213 14:10:04.120973 2023 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:10:04.121286 kubelet[2023]: I1213 14:10:04.121000 2023 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:10:04.407983 kubelet[2023]: I1213 14:10:04.407622 2023 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-vhlnb" podStartSLOduration=28.457397701 podStartE2EDuration="32.407590546s" podCreationTimestamp="2024-12-13 14:09:32 +0000 UTC" firstStartedPulling="2024-12-13 14:09:59.835619446 +0000 UTC m=+28.739492410" lastFinishedPulling="2024-12-13 14:10:03.785812291 +0000 UTC m=+32.689685255" observedRunningTime="2024-12-13 14:10:04.407526505 +0000 UTC m=+33.311399509" watchObservedRunningTime="2024-12-13 14:10:04.407590546 +0000 UTC m=+33.311463510" Dec 13 14:10:05.047965 kubelet[2023]: E1213 14:10:05.047925 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:06.048967 kubelet[2023]: E1213 14:10:06.048918 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:06.926443 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4031827700.mount: Deactivated successfully. Dec 13 14:10:07.051221 systemd[1]: run-containerd-runc-k8s.io-aa38c26a8c37b1a88bdca3a532c8059c0dce59e917b5769af31487327c38f842-runc.SZqqNB.mount: Deactivated successfully. Dec 13 14:10:07.052196 kubelet[2023]: E1213 14:10:07.052165 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:08.052461 kubelet[2023]: E1213 14:10:08.052414 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:08.355069 env[1478]: time="2024-12-13T14:10:08.354965843Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:08.363259 env[1478]: time="2024-12-13T14:10:08.363225339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:08.367405 env[1478]: time="2024-12-13T14:10:08.367380727Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:08.373374 env[1478]: time="2024-12-13T14:10:08.373334043Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:08.374113 env[1478]: time="2024-12-13T14:10:08.374086983Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:10:08.376401 env[1478]: time="2024-12-13T14:10:08.376373962Z" level=info msg="CreateContainer within sandbox \"10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:10:08.403815 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1476156807.mount: Deactivated successfully. Dec 13 14:10:08.422481 env[1478]: time="2024-12-13T14:10:08.422416047Z" level=info msg="CreateContainer within sandbox \"10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"e1839d7ed3fdc0bcf3d227512a8f1c5519516ceb1eb5bdd565132c1a55a23ddb\"" Dec 13 14:10:08.423175 env[1478]: time="2024-12-13T14:10:08.423145586Z" level=info msg="StartContainer for \"e1839d7ed3fdc0bcf3d227512a8f1c5519516ceb1eb5bdd565132c1a55a23ddb\"" Dec 13 14:10:08.439408 systemd[1]: Started cri-containerd-e1839d7ed3fdc0bcf3d227512a8f1c5519516ceb1eb5bdd565132c1a55a23ddb.scope. Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457601 kernel: kauditd_printk_skb: 196 callbacks suppressed Dec 13 14:10:08.457696 kernel: audit: type=1400 audit(1734099008.451:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.496385 kernel: audit: type=1400 audit(1734099008.451:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.517025 kernel: audit: type=1400 audit(1734099008.451:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.559467 kernel: audit: type=1400 audit(1734099008.451:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.559603 kernel: audit: type=1400 audit(1734099008.451:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.580628 kernel: audit: type=1400 audit(1734099008.451:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.600255 kernel: audit: type=1400 audit(1734099008.451:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.603917 env[1478]: time="2024-12-13T14:10:08.603881392Z" level=info msg="StartContainer for \"e1839d7ed3fdc0bcf3d227512a8f1c5519516ceb1eb5bdd565132c1a55a23ddb\" returns successfully" Dec 13 14:10:08.620943 kernel: audit: type=1400 audit(1734099008.451:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.641485 kernel: audit: type=1400 audit(1734099008.451:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.641695 kernel: audit: type=1400 audit(1734099008.451:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit: BPF prog-id=115 op=LOAD Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3091 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:08.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383339643765643366646330626366336432323735313261386631 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3091 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:08.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383339643765643366646330626366336432323735313261386631 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.451000 audit: BPF prog-id=116 op=LOAD Dec 13 14:10:08.451000 audit[3199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3091 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:08.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383339643765643366646330626366336432323735313261386631 Dec 13 14:10:08.457000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.457000 audit: BPF prog-id=117 op=LOAD Dec 13 14:10:08.457000 audit[3199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3091 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:08.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383339643765643366646330626366336432323735313261386631 Dec 13 14:10:08.476000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:10:08.476000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:08.476000 audit: BPF prog-id=118 op=LOAD Dec 13 14:10:08.476000 audit[3199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3091 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:08.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383339643765643366646330626366336432323735313261386631 Dec 13 14:10:09.053501 kubelet[2023]: E1213 14:10:09.053453 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:09.424807 kubelet[2023]: I1213 14:10:09.424689 2023 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-5jhng" podStartSLOduration=16.7656178 podStartE2EDuration="23.42467085s" podCreationTimestamp="2024-12-13 14:09:46 +0000 UTC" firstStartedPulling="2024-12-13 14:10:01.715951397 +0000 UTC m=+30.619824361" lastFinishedPulling="2024-12-13 14:10:08.375004447 +0000 UTC m=+37.278877411" observedRunningTime="2024-12-13 14:10:09.42463985 +0000 UTC m=+38.328512854" watchObservedRunningTime="2024-12-13 14:10:09.42467085 +0000 UTC m=+38.328543814" Dec 13 14:10:10.054091 kubelet[2023]: E1213 14:10:10.054048 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:11.054730 kubelet[2023]: E1213 14:10:11.054698 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:12.022949 kubelet[2023]: E1213 14:10:12.022909 2023 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:12.055300 kubelet[2023]: E1213 14:10:12.055264 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:13.056251 kubelet[2023]: E1213 14:10:13.056220 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:14.056906 kubelet[2023]: E1213 14:10:14.056858 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:14.500060 kubelet[2023]: I1213 14:10:14.500011 2023 topology_manager.go:215] "Topology Admit Handler" podUID="5ce2c88e-960f-417c-82ab-30d94a7c4d19" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:10:14.504968 systemd[1]: Created slice kubepods-besteffort-pod5ce2c88e_960f_417c_82ab_30d94a7c4d19.slice. Dec 13 14:10:14.531755 kubelet[2023]: I1213 14:10:14.531724 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/5ce2c88e-960f-417c-82ab-30d94a7c4d19-data\") pod \"nfs-server-provisioner-0\" (UID: \"5ce2c88e-960f-417c-82ab-30d94a7c4d19\") " pod="default/nfs-server-provisioner-0" Dec 13 14:10:14.531959 kubelet[2023]: I1213 14:10:14.531945 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w2k7x\" (UniqueName: \"kubernetes.io/projected/5ce2c88e-960f-417c-82ab-30d94a7c4d19-kube-api-access-w2k7x\") pod \"nfs-server-provisioner-0\" (UID: \"5ce2c88e-960f-417c-82ab-30d94a7c4d19\") " pod="default/nfs-server-provisioner-0" Dec 13 14:10:14.784000 audit[3256]: NETFILTER_CFG table=filter:77 family=2 entries=20 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.791224 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:10:14.791312 kernel: audit: type=1325 audit(1734099014.784:721): table=filter:77 family=2 entries=20 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.784000 audit[3256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffeb912fd0 a2=0 a3=1 items=0 ppid=2183 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.835738 kernel: audit: type=1300 audit(1734099014.784:721): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffeb912fd0 a2=0 a3=1 items=0 ppid=2183 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.837794 env[1478]: time="2024-12-13T14:10:14.837436216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:5ce2c88e-960f-417c-82ab-30d94a7c4d19,Namespace:default,Attempt:0,}" Dec 13 14:10:14.850022 kernel: audit: type=1327 audit(1734099014.784:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.835000 audit[3256]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.864360 kernel: audit: type=1325 audit(1734099014.835:722): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.835000 audit[3256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeb912fd0 a2=0 a3=1 items=0 ppid=2183 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.892921 kernel: audit: type=1300 audit(1734099014.835:722): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeb912fd0 a2=0 a3=1 items=0 ppid=2183 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.906717 kernel: audit: type=1327 audit(1734099014.835:722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.912000 audit[3262]: NETFILTER_CFG table=filter:79 family=2 entries=32 op=nft_register_rule pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.912000 audit[3262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffce69aa80 a2=0 a3=1 items=0 ppid=2183 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.955979 kernel: audit: type=1325 audit(1734099014.912:723): table=filter:79 family=2 entries=32 op=nft_register_rule pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.956062 kernel: audit: type=1300 audit(1734099014.912:723): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffce69aa80 a2=0 a3=1 items=0 ppid=2183 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.970208 kernel: audit: type=1327 audit(1734099014.912:723): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.955000 audit[3262]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.983937 kernel: audit: type=1325 audit(1734099014.955:724): table=nat:80 family=2 entries=22 op=nft_register_rule pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.955000 audit[3262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffce69aa80 a2=0 a3=1 items=0 ppid=2183 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:15.058438 kubelet[2023]: E1213 14:10:15.057670 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:15.103036 systemd-networkd[1625]: cali60e51b789ff: Link UP Dec 13 14:10:15.116968 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:10:15.117052 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:10:15.118309 systemd-networkd[1625]: cali60e51b789ff: Gained carrier Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.028 [INFO][3263] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.19-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 5ce2c88e-960f-417c-82ab-30d94a7c4d19 1331 0 2024-12-13 14:10:14 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.19 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.028 [INFO][3263] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.050 [INFO][3275] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" HandleID="k8s-pod-network.763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Workload="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.067 [INFO][3275] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" HandleID="k8s-pod-network.763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Workload="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000316ab0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.19", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:10:15.050702717 +0000 UTC"}, Hostname:"10.200.20.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.067 [INFO][3275] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.067 [INFO][3275] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.067 [INFO][3275] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.19' Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.068 [INFO][3275] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" host="10.200.20.19" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.071 [INFO][3275] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.19" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.079 [INFO][3275] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="10.200.20.19" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.080 [INFO][3275] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="10.200.20.19" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.082 [INFO][3275] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="10.200.20.19" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.082 [INFO][3275] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" host="10.200.20.19" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.084 [INFO][3275] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2 Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.088 [INFO][3275] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" host="10.200.20.19" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.095 [INFO][3275] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.67/26] block=192.168.5.64/26 handle="k8s-pod-network.763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" host="10.200.20.19" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.095 [INFO][3275] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.67/26] handle="k8s-pod-network.763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" host="10.200.20.19" Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.095 [INFO][3275] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:10:15.131219 env[1478]: 2024-12-13 14:10:15.095 [INFO][3275] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.67/26] IPv6=[] ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" HandleID="k8s-pod-network.763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Workload="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:10:15.133708 env[1478]: 2024-12-13 14:10:15.096 [INFO][3263] cni-plugin/k8s.go 386: Populated endpoint ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"5ce2c88e-960f-417c-82ab-30d94a7c4d19", ResourceVersion:"1331", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.5.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:15.133708 env[1478]: 2024-12-13 14:10:15.096 [INFO][3263] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.67/32] ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:10:15.133708 env[1478]: 2024-12-13 14:10:15.096 [INFO][3263] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:10:15.133708 env[1478]: 2024-12-13 14:10:15.118 [INFO][3263] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:10:15.133855 env[1478]: 2024-12-13 14:10:15.119 [INFO][3263] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"5ce2c88e-960f-417c-82ab-30d94a7c4d19", ResourceVersion:"1331", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.5.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"8e:16:29:9d:ec:c5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:15.133855 env[1478]: 2024-12-13 14:10:15.129 [INFO][3263] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:10:15.141000 audit[3296]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3296 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:10:15.141000 audit[3296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffc0695780 a2=0 a3=ffffb01b5fa8 items=0 ppid=2676 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:15.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:10:15.145495 env[1478]: time="2024-12-13T14:10:15.145437224Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:10:15.146315 env[1478]: time="2024-12-13T14:10:15.145477382Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:10:15.146315 env[1478]: time="2024-12-13T14:10:15.145487061Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:10:15.146315 env[1478]: time="2024-12-13T14:10:15.145613052Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2 pid=3304 runtime=io.containerd.runc.v2 Dec 13 14:10:15.159555 systemd[1]: Started cri-containerd-763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2.scope. Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.172000 audit: BPF prog-id=119 op=LOAD Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3304 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:15.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736336231623533333033336565646233333638636239343161373232 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3304 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:15.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736336231623533333033336565646233333638636239343161373232 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.173000 audit: BPF prog-id=120 op=LOAD Dec 13 14:10:15.173000 audit[3315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3304 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:15.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736336231623533333033336565646233333638636239343161373232 Dec 13 14:10:15.174000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.174000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.174000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.174000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.174000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.174000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.174000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.174000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.174000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.174000 audit: BPF prog-id=121 op=LOAD Dec 13 14:10:15.174000 audit[3315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3304 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:15.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736336231623533333033336565646233333638636239343161373232 Dec 13 14:10:15.174000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:10:15.174000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:15.175000 audit: BPF prog-id=122 op=LOAD Dec 13 14:10:15.175000 audit[3315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3304 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:15.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736336231623533333033336565646233333638636239343161373232 Dec 13 14:10:15.193996 env[1478]: time="2024-12-13T14:10:15.193963956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:5ce2c88e-960f-417c-82ab-30d94a7c4d19,Namespace:default,Attempt:0,} returns sandbox id \"763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2\"" Dec 13 14:10:15.195895 env[1478]: time="2024-12-13T14:10:15.195870942Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:10:16.058279 kubelet[2023]: E1213 14:10:16.058225 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:16.194868 systemd-networkd[1625]: cali60e51b789ff: Gained IPv6LL Dec 13 14:10:17.058928 kubelet[2023]: E1213 14:10:17.058882 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:17.629335 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1168967024.mount: Deactivated successfully. Dec 13 14:10:18.059929 kubelet[2023]: E1213 14:10:18.059890 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:19.060358 kubelet[2023]: E1213 14:10:19.060317 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:19.527879 env[1478]: time="2024-12-13T14:10:19.527812958Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:19.534694 env[1478]: time="2024-12-13T14:10:19.534662781Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:19.544239 env[1478]: time="2024-12-13T14:10:19.544210439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:19.551558 env[1478]: time="2024-12-13T14:10:19.551527034Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:19.552182 env[1478]: time="2024-12-13T14:10:19.552148676Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Dec 13 14:10:19.555417 env[1478]: time="2024-12-13T14:10:19.555386518Z" level=info msg="CreateContainer within sandbox \"763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:10:19.583634 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2854749845.mount: Deactivated successfully. Dec 13 14:10:19.590123 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2655665938.mount: Deactivated successfully. Dec 13 14:10:19.607918 env[1478]: time="2024-12-13T14:10:19.607863121Z" level=info msg="CreateContainer within sandbox \"763b1b533033eedb3368cb941a722eeb05cd75f457884b09e6e322b4121fbbc2\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"bd39a07b4ae81d568c8df0e05086bff60d6c9274c8ce469c75fabdc10e787685\"" Dec 13 14:10:19.608417 env[1478]: time="2024-12-13T14:10:19.608392409Z" level=info msg="StartContainer for \"bd39a07b4ae81d568c8df0e05086bff60d6c9274c8ce469c75fabdc10e787685\"" Dec 13 14:10:19.625430 systemd[1]: Started cri-containerd-bd39a07b4ae81d568c8df0e05086bff60d6c9274c8ce469c75fabdc10e787685.scope. Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.636000 audit: BPF prog-id=123 op=LOAD Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3304 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:19.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333961303762346165383164353638633864663065303530383662 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3304 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:19.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333961303762346165383164353638633864663065303530383662 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit: BPF prog-id=124 op=LOAD Dec 13 14:10:19.637000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3304 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:19.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333961303762346165383164353638633864663065303530383662 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit: BPF prog-id=125 op=LOAD Dec 13 14:10:19.637000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3304 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:19.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333961303762346165383164353638633864663065303530383662 Dec 13 14:10:19.637000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:10:19.637000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:19.637000 audit: BPF prog-id=126 op=LOAD Dec 13 14:10:19.637000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3304 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:19.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333961303762346165383164353638633864663065303530383662 Dec 13 14:10:19.657200 env[1478]: time="2024-12-13T14:10:19.657162718Z" level=info msg="StartContainer for \"bd39a07b4ae81d568c8df0e05086bff60d6c9274c8ce469c75fabdc10e787685\" returns successfully" Dec 13 14:10:19.696000 audit[3373]: AVC avc: denied { search } for pid=3373 comm="rpcbind" name="crypto" dev="proc" ino=21814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:10:19.696000 audit[3373]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8ad4f000 a2=0 a3=0 items=0 ppid=3356 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 key=(null) Dec 13 14:10:19.696000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:10:19.734000 audit[3378]: AVC avc: denied { search } for pid=3378 comm="dbus-daemon" name="crypto" dev="proc" ino=21814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:10:19.734000 audit[3378]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9f8cf000 a2=0 a3=0 items=0 ppid=3356 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 key=(null) Dec 13 14:10:19.734000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:10:19.737000 audit[3379]: AVC avc: denied { watch } for pid=3379 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538697 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1,c1011 tclass=dir permissive=0 Dec 13 14:10:19.737000 audit[3379]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab02851a40 a2=2c8 a3=aaab02836a60 items=0 ppid=3356 pid=3379 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 key=(null) Dec 13 14:10:19.737000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:10:19.741000 audit[3380]: AVC avc: denied { read } for pid=3380 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:10:19.741000 audit[3380]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa758a570 a2=80000 a3=0 items=0 ppid=3356 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 key=(null) Dec 13 14:10:19.741000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:10:19.742000 audit[3380]: AVC avc: denied { search } for pid=3380 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:10:19.742000 audit[3380]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa691f000 a2=0 a3=0 items=0 ppid=3356 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c1011 key=(null) Dec 13 14:10:19.742000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:10:20.060670 kubelet[2023]: E1213 14:10:20.060598 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:20.441255 kubelet[2023]: I1213 14:10:20.441134 2023 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.082675468 podStartE2EDuration="6.441117784s" podCreationTimestamp="2024-12-13 14:10:14 +0000 UTC" firstStartedPulling="2024-12-13 14:10:15.195274344 +0000 UTC m=+44.099147308" lastFinishedPulling="2024-12-13 14:10:19.55371666 +0000 UTC m=+48.457589624" observedRunningTime="2024-12-13 14:10:20.440953114 +0000 UTC m=+49.344826078" watchObservedRunningTime="2024-12-13 14:10:20.441117784 +0000 UTC m=+49.344990748" Dec 13 14:10:20.459000 audit[3387]: NETFILTER_CFG table=filter:82 family=2 entries=20 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:20.465673 kernel: kauditd_printk_skb: 134 callbacks suppressed Dec 13 14:10:20.465781 kernel: audit: type=1325 audit(1734099020.459:767): table=filter:82 family=2 entries=20 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:20.459000 audit[3387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff8a2fd50 a2=0 a3=1 items=0 ppid=2183 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:20.507789 kernel: audit: type=1300 audit(1734099020.459:767): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff8a2fd50 a2=0 a3=1 items=0 ppid=2183 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:20.507910 kernel: audit: type=1327 audit(1734099020.459:767): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:20.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:20.479000 audit[3387]: NETFILTER_CFG table=nat:83 family=2 entries=106 op=nft_register_chain pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:20.479000 audit[3387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff8a2fd50 a2=0 a3=1 items=0 ppid=2183 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:20.562593 kernel: audit: type=1325 audit(1734099020.479:768): table=nat:83 family=2 entries=106 op=nft_register_chain pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:20.562674 kernel: audit: type=1300 audit(1734099020.479:768): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff8a2fd50 a2=0 a3=1 items=0 ppid=2183 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:20.562705 kernel: audit: type=1327 audit(1734099020.479:768): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:20.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:21.060989 kubelet[2023]: E1213 14:10:21.060931 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:22.061069 kubelet[2023]: E1213 14:10:22.061022 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:23.061519 kubelet[2023]: E1213 14:10:23.061488 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:24.062175 kubelet[2023]: E1213 14:10:24.062138 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:25.063083 kubelet[2023]: E1213 14:10:25.063046 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:26.064204 kubelet[2023]: E1213 14:10:26.064153 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:27.064734 kubelet[2023]: E1213 14:10:27.064696 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:28.065557 kubelet[2023]: E1213 14:10:28.065523 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:29.066604 kubelet[2023]: E1213 14:10:29.066570 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:30.067262 kubelet[2023]: E1213 14:10:30.067223 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:31.067685 kubelet[2023]: E1213 14:10:31.067639 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:32.022921 kubelet[2023]: E1213 14:10:32.022887 2023 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:32.036758 env[1478]: time="2024-12-13T14:10:32.036717416Z" level=info msg="StopPodSandbox for \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\"" Dec 13 14:10:32.068395 kubelet[2023]: E1213 14:10:32.068359 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.069 [WARNING][3420] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"d0090469-4fc9-4b3f-a2af-50f1359a23f9", ResourceVersion:"1301", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 9, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66", Pod:"nginx-deployment-85f456d6dd-5jhng", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliac67147a880", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.069 [INFO][3420] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.069 [INFO][3420] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" iface="eth0" netns="" Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.069 [INFO][3420] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.069 [INFO][3420] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.086 [INFO][3426] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" HandleID="k8s-pod-network.73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.087 [INFO][3426] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.087 [INFO][3426] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.096 [WARNING][3426] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" HandleID="k8s-pod-network.73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.096 [INFO][3426] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" HandleID="k8s-pod-network.73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.097 [INFO][3426] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:10:32.099358 env[1478]: 2024-12-13 14:10:32.098 [INFO][3420] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:32.099875 env[1478]: time="2024-12-13T14:10:32.099841103Z" level=info msg="TearDown network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\" successfully" Dec 13 14:10:32.099939 env[1478]: time="2024-12-13T14:10:32.099923700Z" level=info msg="StopPodSandbox for \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\" returns successfully" Dec 13 14:10:32.100527 env[1478]: time="2024-12-13T14:10:32.100493519Z" level=info msg="RemovePodSandbox for \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\"" Dec 13 14:10:32.100586 env[1478]: time="2024-12-13T14:10:32.100528478Z" level=info msg="Forcibly stopping sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\"" Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.143 [WARNING][3444] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"d0090469-4fc9-4b3f-a2af-50f1359a23f9", ResourceVersion:"1301", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 9, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"10ffc8ba8d9331751a25aaf8c629f0c1216cb162468e413411dadfbd7f3cfb66", Pod:"nginx-deployment-85f456d6dd-5jhng", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliac67147a880", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.144 [INFO][3444] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.144 [INFO][3444] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" iface="eth0" netns="" Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.144 [INFO][3444] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.144 [INFO][3444] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.165 [INFO][3450] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" HandleID="k8s-pod-network.73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.165 [INFO][3450] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.165 [INFO][3450] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.178 [WARNING][3450] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" HandleID="k8s-pod-network.73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.178 [INFO][3450] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" HandleID="k8s-pod-network.73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Workload="10.200.20.19-k8s-nginx--deployment--85f456d6dd--5jhng-eth0" Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.179 [INFO][3450] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:10:32.181620 env[1478]: 2024-12-13 14:10:32.180 [INFO][3444] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881" Dec 13 14:10:32.182101 env[1478]: time="2024-12-13T14:10:32.182073410Z" level=info msg="TearDown network for sandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\" successfully" Dec 13 14:10:32.189901 env[1478]: time="2024-12-13T14:10:32.189872164Z" level=info msg="RemovePodSandbox \"73e030ddce116567940a71842cb92bf886b36ac68297a25be9f01add2c4fa881\" returns successfully" Dec 13 14:10:32.190412 env[1478]: time="2024-12-13T14:10:32.190390945Z" level=info msg="StopPodSandbox for \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\"" Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.223 [WARNING][3468] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-csi--node--driver--vhlnb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9e54fc8c-4579-4b2f-a627-7560b366e192", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 9, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4", Pod:"csi-node-driver-vhlnb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliea9591b3d98", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.223 [INFO][3468] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.223 [INFO][3468] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" iface="eth0" netns="" Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.223 [INFO][3468] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.223 [INFO][3468] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.240 [INFO][3474] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" HandleID="k8s-pod-network.4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.240 [INFO][3474] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.241 [INFO][3474] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.262 [WARNING][3474] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" HandleID="k8s-pod-network.4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.262 [INFO][3474] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" HandleID="k8s-pod-network.4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.264 [INFO][3474] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:10:32.266253 env[1478]: 2024-12-13 14:10:32.265 [INFO][3468] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:10:32.266829 env[1478]: time="2024-12-13T14:10:32.266790426Z" level=info msg="TearDown network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\" successfully" Dec 13 14:10:32.266902 env[1478]: time="2024-12-13T14:10:32.266886022Z" level=info msg="StopPodSandbox for \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\" returns successfully" Dec 13 14:10:32.267516 env[1478]: time="2024-12-13T14:10:32.267484080Z" level=info msg="RemovePodSandbox for \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\"" Dec 13 14:10:32.267578 env[1478]: time="2024-12-13T14:10:32.267522319Z" level=info msg="Forcibly stopping sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\"" Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.305 [WARNING][3492] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-csi--node--driver--vhlnb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9e54fc8c-4579-4b2f-a627-7560b366e192", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 9, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"e8c431ff9a74ff30b79b208e8ca50184c90c54d9b46d7272768b04ae9ee77ff4", Pod:"csi-node-driver-vhlnb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliea9591b3d98", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.305 [INFO][3492] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.305 [INFO][3492] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" iface="eth0" netns="" Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.305 [INFO][3492] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.305 [INFO][3492] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.322 [INFO][3498] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" HandleID="k8s-pod-network.4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.322 [INFO][3498] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.322 [INFO][3498] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.334 [WARNING][3498] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" HandleID="k8s-pod-network.4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.334 [INFO][3498] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" HandleID="k8s-pod-network.4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Workload="10.200.20.19-k8s-csi--node--driver--vhlnb-eth0" Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.335 [INFO][3498] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:10:32.339543 env[1478]: 2024-12-13 14:10:32.337 [INFO][3492] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990" Dec 13 14:10:32.339968 env[1478]: time="2024-12-13T14:10:32.339720273Z" level=info msg="TearDown network for sandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\" successfully" Dec 13 14:10:32.347125 env[1478]: time="2024-12-13T14:10:32.347074004Z" level=info msg="RemovePodSandbox \"4e4c77f7c5d84ac406f6fc4d8b4ec91a9a4ba1adfabd57b97ceb388ed8b20990\" returns successfully" Dec 13 14:10:33.068632 kubelet[2023]: E1213 14:10:33.068586 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:34.069251 kubelet[2023]: E1213 14:10:34.069202 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:35.069496 kubelet[2023]: E1213 14:10:35.069461 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:36.070577 kubelet[2023]: E1213 14:10:36.070535 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:37.030408 systemd[1]: run-containerd-runc-k8s.io-aa38c26a8c37b1a88bdca3a532c8059c0dce59e917b5769af31487327c38f842-runc.WluSVE.mount: Deactivated successfully. Dec 13 14:10:37.070730 kubelet[2023]: E1213 14:10:37.070665 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:38.071455 kubelet[2023]: E1213 14:10:38.071417 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:39.071547 kubelet[2023]: E1213 14:10:39.071507 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:40.072268 kubelet[2023]: E1213 14:10:40.072226 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:41.073389 kubelet[2023]: E1213 14:10:41.073349 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:42.074798 kubelet[2023]: E1213 14:10:42.074767 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:43.075892 kubelet[2023]: E1213 14:10:43.075855 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:44.076909 kubelet[2023]: E1213 14:10:44.076881 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:44.230935 kubelet[2023]: I1213 14:10:44.230900 2023 topology_manager.go:215] "Topology Admit Handler" podUID="19c277cf-3d4c-447e-9e1d-2c3cdeec3777" podNamespace="default" podName="test-pod-1" Dec 13 14:10:44.235753 systemd[1]: Created slice kubepods-besteffort-pod19c277cf_3d4c_447e_9e1d_2c3cdeec3777.slice. Dec 13 14:10:44.383022 kubelet[2023]: I1213 14:10:44.382678 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-6b100132-6d9c-432c-9633-81895870f560\" (UniqueName: \"kubernetes.io/nfs/19c277cf-3d4c-447e-9e1d-2c3cdeec3777-pvc-6b100132-6d9c-432c-9633-81895870f560\") pod \"test-pod-1\" (UID: \"19c277cf-3d4c-447e-9e1d-2c3cdeec3777\") " pod="default/test-pod-1" Dec 13 14:10:44.383215 kubelet[2023]: I1213 14:10:44.383197 2023 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wjsgg\" (UniqueName: \"kubernetes.io/projected/19c277cf-3d4c-447e-9e1d-2c3cdeec3777-kube-api-access-wjsgg\") pod \"test-pod-1\" (UID: \"19c277cf-3d4c-447e-9e1d-2c3cdeec3777\") " pod="default/test-pod-1" Dec 13 14:10:44.636000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.662315 kernel: audit: type=1400 audit(1734099044.636:769): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.691284 kernel: Failed to create system directory netfs Dec 13 14:10:44.691352 kernel: Failed to create system directory netfs Dec 13 14:10:44.691369 kernel: audit: type=1400 audit(1734099044.636:769): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.691421 kernel: Failed to create system directory netfs Dec 13 14:10:44.691441 kernel: audit: type=1400 audit(1734099044.636:769): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.636000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.636000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.714959 kernel: Failed to create system directory netfs Dec 13 14:10:44.715039 kernel: audit: type=1400 audit(1734099044.636:769): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.636000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.636000 audit[3542]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0cb8e5e0 a1=12c14 a2=aaaae4bfe028 a3=aaab0cb7f010 items=0 ppid=51 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:44.761779 kernel: audit: type=1300 audit(1734099044.636:769): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0cb8e5e0 a1=12c14 a2=aaaae4bfe028 a3=aaab0cb7f010 items=0 ppid=51 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:44.774463 kernel: audit: type=1327 audit(1734099044.636:769): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:10:44.636000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.803907 kernel: Failed to create system directory fscache Dec 13 14:10:44.803975 kernel: audit: type=1400 audit(1734099044.764:770): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.804002 kernel: Failed to create system directory fscache Dec 13 14:10:44.804019 kernel: audit: type=1400 audit(1734099044.764:770): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.828318 kernel: Failed to create system directory fscache Dec 13 14:10:44.828383 kernel: audit: type=1400 audit(1734099044.764:770): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.852790 kernel: Failed to create system directory fscache Dec 13 14:10:44.852892 kernel: audit: type=1400 audit(1734099044.764:770): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.872197 kernel: Failed to create system directory fscache Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.881248 kernel: Failed to create system directory fscache Dec 13 14:10:44.881307 kernel: Failed to create system directory fscache Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.890314 kernel: Failed to create system directory fscache Dec 13 14:10:44.890351 kernel: Failed to create system directory fscache Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.899317 kernel: Failed to create system directory fscache Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.904163 kernel: Failed to create system directory fscache Dec 13 14:10:44.904270 kernel: Failed to create system directory fscache Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.913137 kernel: Failed to create system directory fscache Dec 13 14:10:44.913206 kernel: Failed to create system directory fscache Dec 13 14:10:44.764000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.764000 audit[3542]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0cda1210 a1=4c344 a2=aaaae4bfe028 a3=aaab0cb7f010 items=0 ppid=51 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:44.764000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:10:44.922668 kernel: FS-Cache: Loaded Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.981564 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.981717 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.981752 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.990226 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.990275 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.998807 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.998867 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.007448 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.007523 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.015796 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.015858 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.024012 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.028464 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.028519 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.036613 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.036658 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.044972 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.045046 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.052867 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.052917 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.060797 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.060878 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.068735 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.068764 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.076674 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.077885 kubelet[2023]: E1213 14:10:45.077855 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:45.080963 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.081028 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.088841 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.088884 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.096740 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.096788 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.100667 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.108418 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.108463 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.116470 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.116518 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.124454 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.124511 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.132433 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.132487 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.139883 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.139929 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.147181 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.147228 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.159431 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.159482 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.159502 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.166634 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.166690 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.174063 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.174123 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.181241 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.185207 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.185258 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.192847 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.192899 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.200165 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.200217 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.208127 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.208188 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.215549 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.215596 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.223167 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.223219 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.230660 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.230706 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.238541 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.238588 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.246082 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.246134 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.253502 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.253553 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.260841 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.260888 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.268480 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.268590 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.275701 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.275750 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.283597 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.283675 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.291474 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.295280 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.295347 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.302723 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.302805 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.310061 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.310106 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.317597 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.317657 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.321446 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.328764 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.328832 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.336083 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.336137 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.344611 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.344670 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.352877 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.352938 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.361352 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.361389 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.369986 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.370030 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.378301 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.382206 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.382261 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.389628 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.389680 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.397470 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.397519 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.404957 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.405032 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.412803 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.412857 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.420291 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.420341 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.427685 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.427746 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.434886 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.434948 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.442208 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.442251 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.449863 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.449909 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.457179 kernel: Failed to create system directory sunrpc Dec 13 14:10:45.457206 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.460722 kernel: Failed to create system directory sunrpc Dec 13 14:10:44.967000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.477503 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:10:45.477608 kernel: RPC: Registered udp transport module. Dec 13 14:10:45.477636 kernel: RPC: Registered tcp transport module. Dec 13 14:10:45.481224 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:10:44.967000 audit[3542]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0cded560 a1=14a504 a2=aaaae4bfe028 a3=aaab0cb7f010 items=6 ppid=51 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:44.967000 audit: CWD cwd="/" Dec 13 14:10:44.967000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:44.967000 audit: PATH item=1 name=(null) inode=22689 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:44.967000 audit: PATH item=2 name=(null) inode=22689 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:44.967000 audit: PATH item=3 name=(null) inode=22690 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:44.967000 audit: PATH item=4 name=(null) inode=22689 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:44.967000 audit: PATH item=5 name=(null) inode=22691 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:10:44.967000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.670368 kernel: Failed to create system directory nfs Dec 13 14:10:45.670421 kernel: Failed to create system directory nfs Dec 13 14:10:45.670459 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.678118 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.682091 kernel: Failed to create system directory nfs Dec 13 14:10:45.682138 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.689390 kernel: Failed to create system directory nfs Dec 13 14:10:45.689417 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.697530 kernel: Failed to create system directory nfs Dec 13 14:10:45.697605 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.704796 kernel: Failed to create system directory nfs Dec 13 14:10:45.704853 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.712284 kernel: Failed to create system directory nfs Dec 13 14:10:45.712354 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.719649 kernel: Failed to create system directory nfs Dec 13 14:10:45.719690 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.727258 kernel: Failed to create system directory nfs Dec 13 14:10:45.727302 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.735075 kernel: Failed to create system directory nfs Dec 13 14:10:45.735127 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.742292 kernel: Failed to create system directory nfs Dec 13 14:10:45.742351 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.745887 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.749447 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.756988 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.760643 kernel: Failed to create system directory nfs Dec 13 14:10:45.760673 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.767971 kernel: Failed to create system directory nfs Dec 13 14:10:45.768016 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.775669 kernel: Failed to create system directory nfs Dec 13 14:10:45.775718 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.779437 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.787306 kernel: Failed to create system directory nfs Dec 13 14:10:45.787363 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.794539 kernel: Failed to create system directory nfs Dec 13 14:10:45.794592 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.801671 kernel: Failed to create system directory nfs Dec 13 14:10:45.801701 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.809572 kernel: Failed to create system directory nfs Dec 13 14:10:45.809601 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.816857 kernel: Failed to create system directory nfs Dec 13 14:10:45.816904 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.824420 kernel: Failed to create system directory nfs Dec 13 14:10:45.824459 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.831547 kernel: Failed to create system directory nfs Dec 13 14:10:45.831609 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.839158 kernel: Failed to create system directory nfs Dec 13 14:10:45.839202 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.846248 kernel: Failed to create system directory nfs Dec 13 14:10:45.846290 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.854089 kernel: Failed to create system directory nfs Dec 13 14:10:45.854158 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.857616 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.861155 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.868341 kernel: Failed to create system directory nfs Dec 13 14:10:45.868443 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.875662 kernel: Failed to create system directory nfs Dec 13 14:10:45.875719 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.882881 kernel: Failed to create system directory nfs Dec 13 14:10:45.882910 kernel: Failed to create system directory nfs Dec 13 14:10:45.658000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.658000 audit[3542]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0cf966f0 a1=116204 a2=aaaae4bfe028 a3=aaab0cb7f010 items=0 ppid=51 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:45.658000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:10:45.905722 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.001215 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.001331 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.001380 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.008539 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.012281 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.012337 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.019332 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.019418 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.026695 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.026784 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.033962 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.034007 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.041190 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.041247 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.048605 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.048669 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.056192 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.056234 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.059761 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.063342 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.070925 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.070969 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.079130 kubelet[2023]: E1213 14:10:46.079066 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:46.080439 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.080469 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.087712 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.087760 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.094752 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.094796 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.102622 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.102733 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.106257 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.113386 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.113439 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.121591 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.121638 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.129212 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.129241 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.137037 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.137085 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.144495 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.144547 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.152185 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.156254 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.156376 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.164028 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.164065 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.167594 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.171188 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.174905 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.178417 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.182279 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.185820 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.189224 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.192782 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.200076 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.200138 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.207436 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.207495 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.214531 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.214592 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.221729 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.225458 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.225513 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.232969 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.233061 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.239804 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.239852 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.243911 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.247344 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.254395 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.254435 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.261753 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.261793 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.268569 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.268617 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.275709 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.275739 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.279303 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.282954 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.290034 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.290074 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.297066 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.297110 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.303936 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.304001 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.310923 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.314681 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.314743 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.321664 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.321692 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.326811 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.331350 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.338301 kernel: Failed to create system directory nfs4 Dec 13 14:10:46.338368 kernel: Failed to create system directory nfs4 Dec 13 14:10:45.988000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.447322 kernel: NFS: Registering the id_resolver key type Dec 13 14:10:46.447439 kernel: Key type id_resolver registered Dec 13 14:10:46.447478 kernel: Key type id_legacy registered Dec 13 14:10:45.988000 audit[3548]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff978da010 a1=19c49c a2=aaaae989e028 a3=aaab2201f010 items=0 ppid=51 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:45.988000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.508042 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.508118 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.508137 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.515567 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.515633 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.519212 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.522922 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.530544 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.530609 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.538077 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.538138 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.545621 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.545684 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.552967 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.556978 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.557021 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.564423 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.564482 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.568052 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.571736 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.580527 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.580585 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.587972 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.588079 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.595392 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.595451 kernel: Failed to create system directory rpcgss Dec 13 14:10:46.498000 audit[3549]: AVC avc: denied { confidentiality } for pid=3549 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:10:46.498000 audit[3549]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff91272010 a1=5ee04 a2=aaaada6ae028 a3=aaaaf1a2e010 items=0 ppid=51 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:46.498000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:10:47.011018 nfsidmap[3556]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-4df065c637' Dec 13 14:10:47.020040 nfsidmap[3557]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-4df065c637' Dec 13 14:10:47.031000 audit[1581]: AVC avc: denied { watch_reads } for pid=1581 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:10:47.031000 audit[1581]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaea961440 a2=10 a3=0 items=0 ppid=1 pid=1581 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.031000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:10:47.031000 audit[1581]: AVC avc: denied { watch_reads } for pid=1581 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:10:47.031000 audit[1581]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaea961440 a2=10 a3=0 items=0 ppid=1 pid=1581 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.031000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:10:47.031000 audit[1581]: AVC avc: denied { watch_reads } for pid=1581 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:10:47.031000 audit[1581]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaea961440 a2=10 a3=0 items=0 ppid=1 pid=1581 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.031000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:10:47.031000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:10:47.031000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:10:47.031000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:10:47.079984 kubelet[2023]: E1213 14:10:47.079954 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:47.238175 env[1478]: time="2024-12-13T14:10:47.238131660Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:19c277cf-3d4c-447e-9e1d-2c3cdeec3777,Namespace:default,Attempt:0,}" Dec 13 14:10:47.363306 systemd-networkd[1625]: cali5ec59c6bf6e: Link UP Dec 13 14:10:47.374878 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:10:47.374961 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:10:47.376491 systemd-networkd[1625]: cali5ec59c6bf6e: Gained carrier Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.297 [INFO][3560] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.19-k8s-test--pod--1-eth0 default 19c277cf-3d4c-447e-9e1d-2c3cdeec3777 1424 0 2024-12-13 14:10:15 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.19 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.297 [INFO][3560] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.320 [INFO][3572] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" HandleID="k8s-pod-network.37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Workload="10.200.20.19-k8s-test--pod--1-eth0" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.331 [INFO][3572] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" HandleID="k8s-pod-network.37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Workload="10.200.20.19-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000308b80), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.19", "pod":"test-pod-1", "timestamp":"2024-12-13 14:10:47.32017545 +0000 UTC"}, Hostname:"10.200.20.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.331 [INFO][3572] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.331 [INFO][3572] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.331 [INFO][3572] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.19' Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.333 [INFO][3572] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" host="10.200.20.19" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.336 [INFO][3572] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.19" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.340 [INFO][3572] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="10.200.20.19" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.341 [INFO][3572] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="10.200.20.19" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.343 [INFO][3572] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="10.200.20.19" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.343 [INFO][3572] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" host="10.200.20.19" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.345 [INFO][3572] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.350 [INFO][3572] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" host="10.200.20.19" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.358 [INFO][3572] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.68/26] block=192.168.5.64/26 handle="k8s-pod-network.37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" host="10.200.20.19" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.358 [INFO][3572] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.68/26] handle="k8s-pod-network.37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" host="10.200.20.19" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.358 [INFO][3572] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.358 [INFO][3572] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.68/26] IPv6=[] ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" HandleID="k8s-pod-network.37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Workload="10.200.20.19-k8s-test--pod--1-eth0" Dec 13 14:10:47.386837 env[1478]: 2024-12-13 14:10:47.359 [INFO][3560] cni-plugin/k8s.go 386: Populated endpoint ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"19c277cf-3d4c-447e-9e1d-2c3cdeec3777", ResourceVersion:"1424", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:47.388896 env[1478]: 2024-12-13 14:10:47.359 [INFO][3560] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.68/32] ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Dec 13 14:10:47.388896 env[1478]: 2024-12-13 14:10:47.359 [INFO][3560] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Dec 13 14:10:47.388896 env[1478]: 2024-12-13 14:10:47.376 [INFO][3560] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Dec 13 14:10:47.388896 env[1478]: 2024-12-13 14:10:47.377 [INFO][3560] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"19c277cf-3d4c-447e-9e1d-2c3cdeec3777", ResourceVersion:"1424", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 10, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ae:fc:aa:e2:17:5e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:10:47.388896 env[1478]: 2024-12-13 14:10:47.385 [INFO][3560] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Dec 13 14:10:47.395000 audit[3591]: NETFILTER_CFG table=filter:84 family=2 entries=38 op=nft_register_chain pid=3591 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:10:47.395000 audit[3591]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffd65a71e0 a2=0 a3=ffffacbc6fa8 items=0 ppid=2676 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.395000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:10:47.403018 env[1478]: time="2024-12-13T14:10:47.402954147Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:10:47.403122 env[1478]: time="2024-12-13T14:10:47.403030466Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:10:47.403122 env[1478]: time="2024-12-13T14:10:47.403055585Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:10:47.403297 env[1478]: time="2024-12-13T14:10:47.403247622Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db pid=3600 runtime=io.containerd.runc.v2 Dec 13 14:10:47.416969 systemd[1]: Started cri-containerd-37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db.scope. Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.431000 audit: BPF prog-id=127 op=LOAD Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3600 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666139393038346139383034333961323232366166663464663032 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3600 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666139393038346139383034333961323232366166663464663032 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.432000 audit: BPF prog-id=128 op=LOAD Dec 13 14:10:47.432000 audit[3610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3600 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666139393038346139383034333961323232366166663464663032 Dec 13 14:10:47.433000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.433000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.433000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.433000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.433000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.433000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.433000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.433000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.433000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.433000 audit: BPF prog-id=129 op=LOAD Dec 13 14:10:47.433000 audit[3610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3600 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666139393038346139383034333961323232366166663464663032 Dec 13 14:10:47.433000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:10:47.433000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { perfmon } for pid=3610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.434000 audit: BPF prog-id=130 op=LOAD Dec 13 14:10:47.434000 audit[3610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3600 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666139393038346139383034333961323232366166663464663032 Dec 13 14:10:47.452967 env[1478]: time="2024-12-13T14:10:47.452918936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:19c277cf-3d4c-447e-9e1d-2c3cdeec3777,Namespace:default,Attempt:0,} returns sandbox id \"37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db\"" Dec 13 14:10:47.454812 env[1478]: time="2024-12-13T14:10:47.454787421Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:10:47.792345 env[1478]: time="2024-12-13T14:10:47.792301530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:47.800523 env[1478]: time="2024-12-13T14:10:47.800494617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:47.803713 env[1478]: time="2024-12-13T14:10:47.803689278Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:47.807903 env[1478]: time="2024-12-13T14:10:47.807869160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:10:47.808627 env[1478]: time="2024-12-13T14:10:47.808601426Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:10:47.815788 env[1478]: time="2024-12-13T14:10:47.815749813Z" level=info msg="CreateContainer within sandbox \"37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:10:47.843150 env[1478]: time="2024-12-13T14:10:47.843110423Z" level=info msg="CreateContainer within sandbox \"37fa99084a980439a2226aff4df02369aea79d2955120f69aab6fa9bca2118db\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"73908cd673ae21fc1078fe02fbfe66605cf97e7afe05279d21c3f4fa1c3c2275\"" Dec 13 14:10:47.843704 env[1478]: time="2024-12-13T14:10:47.843676692Z" level=info msg="StartContainer for \"73908cd673ae21fc1078fe02fbfe66605cf97e7afe05279d21c3f4fa1c3c2275\"" Dec 13 14:10:47.856570 systemd[1]: Started cri-containerd-73908cd673ae21fc1078fe02fbfe66605cf97e7afe05279d21c3f4fa1c3c2275.scope. Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.868000 audit: BPF prog-id=131 op=LOAD Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3600 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393038636436373361653231666331303738666530326662666536 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3600 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393038636436373361653231666331303738666530326662666536 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit: BPF prog-id=132 op=LOAD Dec 13 14:10:47.869000 audit[3641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3600 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393038636436373361653231666331303738666530326662666536 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit: BPF prog-id=133 op=LOAD Dec 13 14:10:47.869000 audit[3641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3600 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393038636436373361653231666331303738666530326662666536 Dec 13 14:10:47.869000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:10:47.869000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:10:47.869000 audit: BPF prog-id=134 op=LOAD Dec 13 14:10:47.869000 audit[3641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3600 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393038636436373361653231666331303738666530326662666536 Dec 13 14:10:47.887173 env[1478]: time="2024-12-13T14:10:47.887117002Z" level=info msg="StartContainer for \"73908cd673ae21fc1078fe02fbfe66605cf97e7afe05279d21c3f4fa1c3c2275\" returns successfully" Dec 13 14:10:48.081277 kubelet[2023]: E1213 14:10:48.081153 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:49.081463 kubelet[2023]: E1213 14:10:49.081431 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:49.154875 systemd-networkd[1625]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:10:50.082420 kubelet[2023]: E1213 14:10:50.082377 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:51.082904 kubelet[2023]: E1213 14:10:51.082871 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:52.023269 kubelet[2023]: E1213 14:10:52.023234 2023 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:52.083867 kubelet[2023]: E1213 14:10:52.083846 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:53.084456 kubelet[2023]: E1213 14:10:53.084423 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:54.085828 kubelet[2023]: E1213 14:10:54.085792 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:55.086160 kubelet[2023]: E1213 14:10:55.086123 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:56.086868 kubelet[2023]: E1213 14:10:56.086835 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:10:57.087847 kubelet[2023]: E1213 14:10:57.087811 2023 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"